It is with great pleasure that we welcome you to the ACM SIGPLAN 2013 International Symposium on Memory Management (ISMM'13). This year continues ISMM's tradition as the top venue for presenting research results on memory management.
The eleven papers appearing in these proceedings cover diverse and interesting aspects of memory management. A double-blind reviewing system was used, and the Program Committee met in person to facilitate thorough discussion of the papers. In addition to three reviews by Program Committee members, each paper received one review by a member of the External Review Committee, which increased the range and depth of reviewer expertise. Authors were provided an opportunity to submit rebuttal responses to initial reviews, which helped ensure that decisions were not based on faulty interpretations. Review Committee members were allowed to be authors of submitted papers. Program Committee members were allowed to submit papers, but such submissions are held to a higher standard; no such papers were submitted this year.
Proceeding Downloads
Towards hinted collection: annotations for decreasing garbage collector pause times
Garbage collection is widely used and has largely been a boon for programmer productivity. However, traditional garbage collection is approaching both practical and theoretical performance limits. In practice, the maximum heap size and heap structure of ...
Adaptive scanning reduces sweep time for the Lisp2 mark-compact garbage collector
Mark-compact garbage collection helps long-running programs avoid fragmentation. The Lisp2 mark-compact collector is a classic but still widely-used compaction algorithm. It sequentially scans the entire heap to compact all live objects at one end of ...
Control theory for principled heap sizing
We propose a new, principled approach to adaptive heap sizing based on control theory. We review current state-of-the-art heap sizing mechanisms, as deployed in Jikes RVM and HotSpot. We then formulate heap sizing as a control problem, apply and tune a ...
Pacman: program-assisted cache management
As caches become larger and shared by an increasing number of cores, cache management is becoming more important. This paper explores collaborative caching, which uses software hints to influence hardware caching. Recent studies have shown that such ...
Generating sound and effective memory debuggers
We present a new approach for constructing debuggers based on declarative specification of bug conditions and root causes, and automatic generation of debugger code. We illustrate our approach on several classes of bugs, memory or otherwise. For each ...
Rigorous benchmarking in reasonable time
Experimental evaluation is key to systems research. Because modern systems are complex and non-deterministic, good experimental methodology demands that researchers account for uncertainty. To obtain valid results, they are expected to run many ...
ACDC: towards a universal mutator for benchmarking heap management systems
We present ACDC, an open-source benchmark that may be configured to emulate explicit single- and multi-threaded memory allocation, sharing, access, and deallocation behavior to expose virtually any relevant allocator performance differences. ACDC mimics ...
Precise and scalable context-sensitive pointer analysis via value flow graph
In this paper, we propose a novel method for context-sensitive pointer analysis using the value flow graph (VFG) formulation. We achieve context-sensitivity by simultaneously applying function cloning and computing context-free language reachability (...
Analyzing memory ownership patterns in C libraries
Programs written in multiple languages are known as polyglot programs. In part due to the proliferation of new and productive high-level programming languages, these programs are becoming more common in environments that must interoperate with existing ...
Elephant tracks: portable production of complete and precise gc traces
We present Elephant Tracks (ET), a dynamic program analysis tool for Java that produces detailed traces of garbage collection-related events, including object allocations, object deaths, and pointer updates. Like prior work, our tracing tool is based on ...
A bloat-aware design for big data applications
Over the past decade, the increasing demands on data-driven business intelligence have led to the proliferation of large-scale, data-intensive applications that often have huge amounts of data (often at terabyte or petabyte scale) to process. An object-...
Cited By
-
Yu T, Weng M, Yang S, Cheng G, Zhu Y and Grzesik J (2015). Through-the-wall imaging of 3D objects 2015 IEEE MTT-S 2015 International Microwave Workshop Series on RF and Wireless Technologies for Biomedical and Healthcare Applications (IMWS-BIO), 10.1109/IMWS-BIO.2015.7303833, 978-1-4799-8543-2, (170-171)
-
Wang J (2015). Low-Q Antennas Miniaturized with Adaptive Tuning for small-platform applications 2015 IEEE International Symposium on Antennas and Propagation & USNC/URSI National Radio Science Meeting, 10.1109/APS.2015.7305170, 978-1-4799-7815-1, (1562-1563)
-
Cheng G, Zhu Y and Grzesik J (2015). Through-the-wall imaging of 3D objects 2015 IEEE International Symposium on Antennas and Propagation & USNC/URSI National Radio Science Meeting, 10.1109/APS.2015.7304779, 978-1-4799-7815-1, (784-785)
Index Terms
- Proceedings of the 2013 international symposium on memory management