Programming Languages and Systems (TOPLAS)


Search Issue
enter search term and/or author name


ACM Transactions on Programming Languages and Systems (TOPLAS), Volume 22 Issue 3, May 2000

Fusion-based register allocation
Guei-Yuan Lueh, Thomas Gross, Ali-Reza Adl-Tabatabai
Pages: 431-470
DOI: 10.1145/353926.353929
The register allocation phase of a compiler maps live ranges of a program to registers. If there are more candidates than there are physical registers, the register allocator must spill a live range (the home location is in memory) or split a...

Java bytecode compression for low-end embedded systems
Lars Ræder Clausen, Ulrik Pagh Schultz, Charles Consel, Gilles Muller
Pages: 471-489
DOI: 10.1145/353926.353933
A program executing on a low-end embedded system, such as a smart-card, faces scarce memory resources and fixed execution time constraints. We demonstrate that factorization of common instruction sequences in Java bytecode allows the memory...

Automated data-member layout of heap objects to improve memory-hierarchy performance
Thomas Kistler, Michael Franz
Pages: 490-505
DOI: 10.1145/353926.353937
We present and evaluate a simple, yet efficient optimization technique that improves memory-hierarchy performance for pointer-centric applications by up to 24% and reduces cache misses by up to 35%. This is achieved by selecting an improved...

Integrating object-oriented programming and protected objects in Ada 95
A. J. Wellings, B. Johnson, B. Sanden, J. Kienzle, T. Wolf, S. Michell
Pages: 506-539
DOI: 10.1145/353926.353938
Integrating concurrent and object-oriented programming has been an active research topic since the late 1980's. There is a now a plethora of methods for achieving this integration. The majority of approaches have taken a sequential...

Understanding class hierarchies using concept analysis
Gregor Snelting, Frank Tip
Pages: 540-582
DOI: 10.1145/353926.353940
A new method is presented for analyzing and reengineering class hierarchies. In our approach, a class hierarchy is processed along with a set of applications that use it, and a fine-grained analysis of the access and subtype relationships...