View Java Virtual Machine Research Papers on Academia.edu for free.
The Relaxed-Lock protocol is used to implement Java-level monitors. It is private to the JVM and is not visible to Java programs. The design described in this paper was implemented in the Sun Laboratories Virtual Machine for Research (ResearchVM). ResearchVM was previously known as EVM, ExactVM and the Java 2 SDK Production Release.
On the Software Virtual Machine for the Real Hardware Stack Machine. Takashi Aoki Autonomous System Laboratory, Fujitsu Laboratories Limited. Takeshi Eto Semiconductor Group, Fujitsu Limited. Abstract Several technologies for Java 1 program execution have been reported, e.g., Just-In-Time (JIT) compilation, pre-compilation engine, etc., to improve its running speed.Java platform (an arbitrary Java virtual machine implementation is hereafter referred to as a JVM). HotSpot's origins are in language research in Beta, Smalltalk, and Self. The HotSpot JVM uses many advanced techniques to achieve high performance. The system employs a.Abstract: The Java Virtual Machine (Jvm) needs, for the purpose of garbage collection (GC), to determine the data type stored in every memory location. Jvms that can do this reliably are said to betype-accurate(TA). Full type- accuracy usually exacts a price in performance due to the need to scan stacks and registers accurately.
This paper provides a broad overview of memory management in the Java HotSpot virtual machine (JVM) in Sun’s J2SE 5.0 release. It describes the garbage collectors available to perform the memory management, and gives some advice regarding choosing and configuring a collector and setting sizes for the memory areas on which the collector operates.
Abstract Abstract—This paper presents a failure analy- sis of the Java Virtual Machine in order to pro- vide useful insigths into the nature of reported failures and to improve the understanding of.
During an effort to port the Jikes Research Virtual Machine (RVM) to the 64-bit PowerPC, we stumbled into a number of problems that prove that the Java specification was designed with a 32-bit.
This paper presents a monitoring infrastructure for the Java Virtual Machine (JVM), which is starting to be employed in mission and safety critical application, often with real-time requirements.
THE DALVIK VIRTUAL MACHINE ARCHITECTURE Introduction Java has always been marketed as “write once, run anywhere.” The capability has largely been made possible by the Java Platform, the foundation of which is the Java Virtual Machine (JVM). Although this goal has largely been met for the Java platform on desktop (JSE) and server (JEE).
View Virtual Machines Research Papers on Academia.edu for free.
It means not real machine, however, it acts like a machine.Not any machine but as a machine called Central Processing Unit(CPU). You could understand this like, whenever you write java program, you are writing instructions for a machine, but this machine is abstract, which is called Java Virtual Machine(JVM). For each Operating system(OS) there is a Virtual Machine so that you do not have to.
Da capo con scala: design and analysis of a scala benchmark suite for the java virtual machine. In OOPSLA '11 Proceedings of the 2011 ACM international conference on Object oriented programming systems languages and applications (pp. 657-676).
Jikes Research Virtual Machine (Jikes RVM) is a mature virtual machine that runs programs written for the Java platform. Unlike most other Java virtual machines (JVMs), it is written in the programming language Java, in a style of implementation termed meta-circular. It is free and open source software released under an Eclipse Public License.
Virtual machine technology allows for the reuse of applications and code over various heterogeneous platforms. A virtual machine simply adds another layer of abstraction between the application and the native hardware. A major drawback of an application running on a virtual machine, however, is that the performance is below that of an application targeted for a native platform.
We build a trace collection system for the Jikes Research Virtual Machine and create traces based on the execution of the SPECjvm98 and Java Grande benchmarks. We evaluate the use of traces for inlining in Jikes, and find that the use of traces leads to a decrease in execution time of 10%, when compared to providing similar information from Jikes’s adaptive system from a previous execution.