2019
DOI: 10.1109/access.2019.2919203
|View full text |Cite
|
Sign up to set email alerts
|

Refactoring Java Programs for Customizable Locks Based on Bytecode Transformation

Abstract: Developers of parallel programming are faced with choices of using various Java locks. Choosing the best lock is a challenging task because a multithreaded application implemented using different locks may end up with uncertain performance. There is a strong need for automated tool support that helps Java programmers choose the best lock for each specific application. This paper presents an automated transformation approach to convert an implementation using a synchronized lock to a ReentrantLock or a Reentran… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

4
4

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 25 publications
0
12
0
Order By: Relevance
“…Programmers could compare the performance of concurrent programs with different locks so that they could find which locks obtained the best performance. Similar to their work, Zhang et al presented an automated refactoring tool among locks on byte code (Zhang et al, 2019b). Their works made refactoring applicable to those applications without source code.…”
Section: Resultsmentioning
confidence: 95%
See 1 more Smart Citation
“…Programmers could compare the performance of concurrent programs with different locks so that they could find which locks obtained the best performance. Similar to their work, Zhang et al presented an automated refactoring tool among locks on byte code (Zhang et al, 2019b). Their works made refactoring applicable to those applications without source code.…”
Section: Resultsmentioning
confidence: 95%
“…Researchers have tried to resolve how to convert different synchronization mechanisms to explore the best performance. Some works (Schafer et al, 2011; Zhang et al, 2019b) have proven that the performances of programs with different synchronization mechanisms are dramatically different. Many factors contribute to the performance trade-off, such as the data structure, times and scale of read and write operations, etc.…”
Section: Resultsmentioning
confidence: 99%
“…Zhang et al 29 presented an automated refactoring method among locks at the byte code level. With the promising features of StampedLock, Zhang et al 30 presented an automated refactoring framework to convert a synchronized lock to a StampedLock.…”
Section: Refactoring Consistency-based Methodsmentioning
confidence: 99%
“…The new feature information is obtained by multiplying the weight value and the original feature information. The weighted value S is calculated by Equation (2).…”
Section: Metric-attention Mechanismmentioning
confidence: 99%