|
[1] R. Jones and R. Lins, Garbage collection: algorithms for automatic dynamic memory management. Wiley, 1996. [2] E. K. Maxwell, G. Back, and N. Ramakrishnan, "Diagnosing memory leaks using graph mining on heap dumps," in Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, ser. KDD ’10. New York, NY, USA: ACM, 2010, pp. 115–124. [3] Jprobe. Quest Software. [Online]. Available: http://www.quest.com/jprobe/ [4] M. D. Bond and K. S. McKinley, "Bell: bit-encoding online memory leak detection," SIGPLAN Not., vol. 41, pp. 61–72, October 2006. [5] M. Jump and K. S. McKinley, "Detecting memory leaks in managed languages with cork," Software: Practice and Experience, vol. 40, no. 1, pp. 1–22, 2010. [Online]. Available: http://dx.doi.org/10.1002/spe.945 [6] Jrockit mission control. Oracle. [Online]. Available: http://www.oracle.com/technetwork/middleware/jrockit/overview/index-090630.html [7] Jikes rvm. The Jikes RVM Project. [Online]. Available: http://jikesrvm.org/ [8] Oracle jrockit jvm. Oracle Corporation. [Online]. Available: http://www.oracle.com/technetwork/middleware/jrockit/overview/index.html [9] Java se hotspot. Oracle Corporation. [Online]. Available: http://www.oracle.com/technetwork/java/javase/tech/hotspot-138757.html [10] Jvm tool interface version 1.2. Oracle. [Online]. Available: http://docs.oracle.com/javase/7/docs/platform/jvmti/jvmti.html [11] K. D. Cooper, T. J. Harvey, and K. Kennedy, "A simple, fast dominance algorithm," 2001. [Online]. Available: http://www.hipersoft.rice.edu/grads/publications/dom14.pdf [12] Eclipse bug 115789 - memory leak. The Eclipse Foundation. [Online]. Available: https://bugs.eclipse.org/bugs/show_bug.cgi?id=115789
|