|
[1] Chris Wilkinson, 對Web服務進行壓力測試 http://www.ibm.com/developerworks/tw/library/ws-tip-strstest/ [2] Apache Software Foundation. “JMeter”. http://jakarta.apache.org/jmeter/ [3] Sun Microsystems. “Java HotSpot VM Options”. http://java.sun.com/javase/technologies/hotspot/vmoptions.jsp [4] Sun Microsystems. “Tuning Garbage Collection with the 1.4.2 Java[tm] Virtual Machine”. http://java.sun.com/docs/hotspot/gc1.4.2/ [5] Antonia Bertolino, “Software testing research: Achievements, challenges, dreams”, 2007 Future of Software Engineering, 2007. [6] Cristiana Amza, et al., “Bottleneck characterization of dynamic web site benchmarks”, Third IBM CAS, 2002. [7] CTD Lo, et al. “Who is collecting your Java garbage?”, IT Professional, 5, 2, pp. 44-50, 2003. [8] David Evans, “Static detection of dynamic memory errors”, ACM SIGPLAN Notices, 31, 5, pp. 44-53, 1996. [9] David Lorge Parnas, “Software aging”, Proceedings of the 16th international conference on Software engineering , pp. 279-287, 1994. [10] Dykstra Luke, et al., “An analysis of the garbage collection performance in Sun's HotSpot Java Virtual Machine”, Performance, Computing, and Communications Conference, 2002. 21st IEEE International, pp. 335-339, 2002. [11] Gaurav Banga, Peter Druschel, “Measuring the capacity of a web server”, In USENIX Symposiumon Internet Technologies and Systems, pp 61-71, 1997. [12] Joe Touch, et al., “Analysis of HTTP performance”, USC / Information Sciences Institute, 1998. [13] Lance Titchkosky, et al., “A performance comparison of dynamic Web technologies”, ACM SIGMETRICS Performance Evaluation Review, 31, 3, 2003. [14] Lei Li, et al., “An approach for estimation of software aging in a web server”, Proceedings of the 2002 International Symposium on Empirical Software Engineering, 2002. [15] Qiaoyun Li. Java Virtual Machine - Present And Near Future. Technology of Object-Oriented Languages, 1998. TOOLS 26. Proceedings (1998) pp. 480-480. [16] Qinglin Wu, Yan Wang, “Performance Testing and Optimization of J2EE-Based Web Applications”, Education Technology and Computer Science (ETCS), 2010 Second International Workshop, 2, pp. 681-683, 2009. [17] Roger M. Needham, “Denial of service”, Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 153, 1993. [18] Tim Brecht,et al., “Controlling garbage collection and heap growth to reduce the execution time of Java applications”, Transactions on Programming Languages and Systems, 28, 5, 2006.
|