How Weak Reference is Used in Java']Java Projects?

被引:0
|
作者
Higo, Yoshiki [1 ]
Matsumoto, Shinsuke [1 ]
Kim, Taeyoung [1 ]
Kusumoto, Shinji [1 ]
机构
[1] Osaka Univ, Grad Sch Informat Sci & Technol, Suita, Osaka, Japan
关键词
Weak reference; Garbage collection; !text type='Java']Java[!/text; GitHub;
D O I
10.1109/APSEC51365.2020.00053
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Many programming languages have a system of garbage collection to automate memory management. Problems such as unexpected memory leak still may occur due to the automation of memory management. Weak reference has been proposed as a solution to such problems. However, the use of weak reference often requires consideration of memory release timing, which is difficult for developers. In this study, we investigate the use of weak reference on open source projects. More concretely, we investigated the domain of software projects where the weak reference was used, the timing of the introduction of the weak reference, the usage method, the presence or absence of the test code for weak reference, and the case of failure to introduce weak reference in the Java language. The survey showed that weak references were used in 73 repositories, about one-third of the total 202 repositories, and that weak references were most common in test code.
引用
收藏
页码:445 / 449
页数:5
相关论文
共 50 条
  • [31] A distributed computing course with Java']Java based middleware projects
    Ahuja, SP
    PDPTA '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS 1-3, 2004, : 1013 - 1016
  • [32] Memory and resource leak defects and their repairs in Java']Java projects
    Ghanavati, Mohammadreza
    Costa, Diego
    Seboek, Janos
    Lo, David
    Andrzejak, Artur
    EMPIRICAL SOFTWARE ENGINEERING, 2020, 25 (01) : 678 - 718
  • [33] Optimizing array reference checking in Java']Java programs
    Midkiff, SP
    Moreira, JE
    Snir, M
    IBM SYSTEMS JOURNAL, 1998, 37 (03) : 409 - 453
  • [34] How Do Java']Java Methods Grow?
    Steidl, Daniela
    Deissenboeck, Florian
    2015 IEEE 15TH INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION (SCAM), 2015, : 151 - 160
  • [35] How Final is Java']Java's final?
    Baridam, Barilee
    2015 SCIENCE AND INFORMATION CONFERENCE (SAI), 2015, : 946 - 948
  • [36] How Java']Java can pay the rent
    Hummel, RL
    BYTE, 1996, 21 (06): : 40 - &
  • [37] How to program Java']Java - Coffee,P
    Copler, JA
    ONLINE, 1997, 21 (02): : 91 - 91
  • [38] How do I print in Java']Java?
    Berg, C
    DR DOBBS JOURNAL, 1997, 22 (11): : 110 - +
  • [39] Inferring Weak References for Fixing Java']Java Memory Leaks
    Qian, Ju
    Zhou, Xiaoyu
    2012 28TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE (ICSM), 2012, : 571 - 574
  • [40] Practical Weak-Atomicity Semantics for Java']Java STM
    Menon, Vijay
    Balensiefer, Steven
    Shpeisman, Tatiana
    Adl-Tabatabai, Ali-Reza
    Hudson, Richard L.
    Saha, Bratin
    Welc, Adam
    SPAA'08: PROCEEDINGS OF THE TWENTIETH ANNUAL SYMPOSIUM ON PARALLELISM IN ALGORITHMS AND ARCHITECTURES, 2008, : 314 - +