Access the full text.
Sign up today, get DeepDyve free for 14 days.
Michael Stilkerich, Isabella Thomm, Christian Wawersich, Wolfgang Schröder-Preikschat (2012)
Tailor‐made JVMs for statically configured embedded systemsConcurrency and Computation: Practice and Experience, 24
AUTOSAR. (2010)
Specification of Operating System (Version 4Technical Report. Automotive Open System Architecture GbR.
Mark Aiken, Manuel Fähndrich, C. Hawblitzel, G. Hunt, J. Larus (2006)
Deconstructing process isolation
Kyungwoon Lee, Xing Fang, S. Midkiff (2007)
Practical escape analyses: how good are they?
P. Cousot, R. Cousot (1977)
Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpointsProceedings of the 4th ACM SIGACT-SIGPLAN symposium on Principles of programming languages
Keso Multi-JVM (2012)
Improved Stack Allocation Using Escape Analysis in the
S. Carr, K. McKinley, C. Tseng (1994)
Compiler optimizations for improving data locality
Greg Bollella, Benjamin Brosgol, James Gosling, Peter Dibble, Steve Furr, Mark Turnbull (2000)
The Real-Time Specification for Java (1st edThe Real-Time Specification for Java (1st ed.).
T. Kalibera, J. Hagelberg, F. Pizlo, Ales Plsek, Ben Titzer, J. Vitek (2009)
CDx: a family of real-time Java benchmarks
G. Bollella, James Gosling (2000)
The Real-Time Specification for JavaComputer, 33
R. Tarjan (1972)
Depth-First Search and Linear Graph AlgorithmsSIAM J. Comput., 1
(2010)
Automotive Open System Architecture GbR
R. Ghiya, L. Hendren (1996)
Connection Analysis: A Practical Interprocedural Heap Analysis for CInternational Journal of Parallel Programming, 24
Clemens Lang (2014)
Compiler-Assisted Memory Management Using Escape Analysis in the KESO JVM
W. Landi, B. Ryder (1992)
A safe approximate algorithm for interprocedural aliasing, 27
Jong-Deok Choi, Manish Gupta, M. Serrano, V. Sreedhar, S. Midkiff (1999)
Escape analysis for Java
David Gay, B. Steensgaard (1998)
Stack Allocating Objects in Java ( Extended Abstract )
Isabella Stilkerich, Michael Strotz, Christoph Erhardt, Michael Stilkerich (2014)
RT-LAGC: Fragmentation-Tolerant Real-Time Memory Management Revisited
Clemens Lang (2012)
Improved Stack Allocation using Escape Analysis in the KESO Multi-JVM (Bachelor Thesis)Friedrich-Alexander University Erlangen-Nuremberg
Ramkrishna Chatterjee, B. Ryder, W. Landi (1999)
Relevant context inference
T. Domani, Gal Goldshtein, E. Kolodner, E. Lewis, E. Petrank, D. Sheinwald (2002)
Thread-local heaps for Java
Robert Wilson, M. Lam (1995)
Efficient context-sensitive pointer analysis for C programs
Clemens Lang (2014)
Compiler-assisted memory management using escape analysis in the KESO JVM (Master Thesis)Friedrich-Alexander University Erlangen-Nuremberg
Y. Park, B. Goldberg (1992)
Escape analysis on lists
Isabella Stilkerich, Clemens Lang, Christoph Erhardt, Christian Bay, Michael Stilkerich (2017)
The Perfect GetawayACM Transactions on Embedded Computing Systems (TECS), 16
Maryam Emami, R. Ghiya, L. Hendren (1994)
Context-sensitive interprocedural points-to analysis in the presence of function pointers
Jong-Deok Choi, M. Burke, P. Carini (1993)
Efficient flow-sensitive interprocedural computation of pointer-induced aliases and side effects
Jong-Deok Choi, Manish Gupta, M. Serrano, V. Sreedhar, S. Midkiff (2003)
Stack allocation and synchronization optimizations for Java using escape analysisACM Trans. Program. Lang. Syst., 25
T. Jim, G. Morrisett, D. Grossman, M. Hicks, J. Cheney, Yanling Wang (2002)
Cyclone: A Safe Dialect of C
B. Goldberg, Y. Park (1990)
Higher Order Escape Analysis: Optimizing Stack Allocation in Functional Program Implementations
B. Blanchet (1999)
Escape analysis for object-oriented languages: application to Java
B. Blanchet (2003)
Escape analysis for JavaTM: Theory and practiceACM Trans. Program. Lang. Syst., 25
(2003)
Escape Analysis for Java. Theory and Practice
B. Blanchet (1998)
Escape analysis: correctness proof, implementation and experimental results
Lukas Stadler, Thomas Würthinger, H. Mössenböck (2014)
Partial Escape Analysis and Scalar Replacement for Java
B. Steensgaard (1996)
Points-to analysis in almost linear time
Article 165
Isabella Stilkerich, Clemens Lang, Christoph Erhardt, Michael Stilkerich (2015)
A Practical Getaway: Applications of Escape Analysis in Embedded Real-Time SystemsProceedings of the 16th ACM SIGPLAN/SIGBED Conference on Languages, Compilers and Tools for Embedded Systems 2015 CD-ROM
BlanchetBruno (1999)
Escape analysis for object-oriented languagesSigplan Notices
The use of a managed, type-safe language such as Standard ML, Ada Ravenscar, or Java in hard real-time and embedded systems offers productivity, safety, and dependability benefits at a reasonable cost. Static software systems, that is systems in which all relevant resource entities such as threads and their priorities, for instance, and the entire source code are known ahead of time, are particularly interesting for the deployment in safety-critical embedded systems: Code verification is rather maintainable in contrast to dynamic systems. Additionally, static analyses can incorporate information from all software and system layers to assist compilers in emitting code that is well suited to an application on a particular hardware device. It was shown in the past that a program composed in type-safe Java in combination with a static system setup can be as efficient as one that is written in C [30], which is still the most widely used language in the embedded domain. Escape analysis (EA) is one of several static-analysis techniques. It supports, for instance, runtime efficiency by enabling automated stack allocation of objects. In addition, Stilkerich et al. [27, 28] have argued that EA enables further applications in safety-critical embedded systems such as the computation of memory classes stated in the Real-Time Specification for Java (RTSJ) [6]. EA can be applied to any programming language but the quality of its results greatly benefits from the properties of a type-safe language. Notably, embedded multicore devices can positively be affected by the use of EA. Thus, we explore an ahead-of-time (AOT) escape analysis in the context of the KESO JVM featuring a Java AOT compiler targeting (deeply) embedded (hard) real-time systems.
ACM Transactions on Embedded Computing Systems (TECS) – Association for Computing Machinery
Published: Feb 7, 2020
Keywords: Escape analysis
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.