2005
DOI: 10.1145/1071604.1071606
|View full text |Cite
|
Sign up to set email alerts
|

The design, implementation, and evaluation of adaptive code unloading for resource-constrained devices

Abstract: Java Virtual Machines (JVMs) for resource-constrained devices, e.g., hand-helds and cell phones, commonly employ interpretation for program translation. However, compilers are able to produce significantly better code quality, and hence, use device resources more efficiently than interpreters, since compilers can consider large sections of code concurrently and exploit optimization opportunities. Moreover, compilation-based systems store code for reuse by future invocations obviating the redundant computation … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2006
2006
2021
2021

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…Recent work has investigated the problem of caching small portions of Java programs on resource-constrained devices [Chen et al 2003;Zhang and Krintz 2005;Zhou et al 2005]. This problem is similar to code cache management because of the high overhead of replacing code on remote devices; however, it differs in that the unit of eviction is a fixed-size region.…”
Section: Resource-constrained Devicesmentioning
confidence: 99%
“…Recent work has investigated the problem of caching small portions of Java programs on resource-constrained devices [Chen et al 2003;Zhang and Krintz 2005;Zhou et al 2005]. This problem is similar to code cache management because of the high overhead of replacing code on remote devices; however, it differs in that the unit of eviction is a fixed-size region.…”
Section: Resource-constrained Devicesmentioning
confidence: 99%
“…While virtual machine alteration is a valid and commonly used technique in academia [Blackburn et al, 2006;Bond and McKinley, 2008;Jump and McKinley, 2007;Tang et al, 2008;Zhang and Krintz, 2005], particularly the use of the Jikes Research Virtual Machine [Jike RVM Project, 2009], doing so would hinder the applicability to the various operational environments it aims to support. Virtual machine modification and bytecode engineering both provide transparency and type orthogonality, but virtual machine modification lacks extensibility and configurability; unless aimed at a specific software product, a virtual machine with custom memory management is unlikely to support customization or configuration.…”
Section: Selected Approachmentioning
confidence: 99%
“…Examples of memory-constrained systems include expert systems [Marney and Ibrahim, 1995], scientific computing , data mining [Kantardzic, 2002;Liu, 2008], business applications, and sensor networks [Liu et al, 2005]. Because of its safety and portability, Java is commonly utilized to implement software on resource-constrained devices [Bhadra et al, 2009;Zhang and Krintz, 2005]. For example, the K virtual machine (KVM) [Sun Microsystem, Inc., 2000] is engineered for running Java applications in embedded systems with less than 128 KB of main memory.…”
Section: Introductionmentioning
confidence: 99%