ACM DL

Programming Languages and Systems (TOPLAS)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Programming Languages and Systems (TOPLAS), Volume 28 Issue 1, January 2006

An on-the-fly reference-counting garbage collector for java
Yossi Levanoni, Erez Petrank
Pages: 1-69
DOI: 10.1145/1111596.1111597
Reference-counting is traditionally considered unsuitable for multiprocessor systems. According to conventional wisdom, the update of reference slots and reference-counts requires atomic or synchronized operations. In this work we demonstrate this is...

EDO: Exception-directed optimization in java
Takeshi Ogasawara, Hideaki Komatsu, Toshio Nakatani
Pages: 70-105
DOI: 10.1145/1111596.1111598
Optimizing exception handling is critical for programs that frequently throw exceptions. We observed that there are many such exception-intensive programs written in Java. There are two commonly used exception handling techniques, stack unwinding and...

Effective sign extension elimination for java
Motohiro Kawahito, Hideaki Komatsu, Toshio Nakatani
Pages: 106-133
DOI: 10.1145/1111596.1111599
Computer designs are shifting from 32-bit architectures to 64-bit architectures, while most of the programs available today are still designed for 32-bit architectures. Java, for example, specifies the frequently used “int” as a 32-bit...

A region-based compilation technique for dynamic compilers
Toshio Suganuma, Toshiaki Yasue, Toshio Nakatani
Pages: 134-174
DOI: 10.1145/1111596.1111600
Method inlining and data flow analysis are two major optimization components for effective program transformations, but they often suffer from the existence of rarely or never executed code contained in the target method. One major problem lies in...

Computability classes for enforcement mechanisms
Kevin W. Hamlen, Greg Morrisett, Fred B. Schneider
Pages: 175-205
DOI: 10.1145/1111596.1111601
A precise characterization of those security policies enforceable by program rewriting is given. This also exposes and rectifies problems in prior work, yielding a better characterization of those security policies enforceable by execution monitors...