参考文献:
[1]Francis M David, Roy H Campbell. Building a selfhealing operating system[C]// The Third IEEE International Symposium on Dependable, Autonomic and Secure Computing. 2007:3-10.
[2]Michael M Swift, Brian N Bershad, Henry M Levy. Improving the reliability of commodity operating systems[J]. ACM SIGOPS Operating Systems Review, 2003,37(5):207-222.
[3]Avizienis Algirdas, Laprie J C, Randell Brian, et al. Basic concepts and taxonomy of dependable and secure computing[J]. IEEE Transactions on Dependable and Secure Computing, 2004,1(1):11-33.
[4]Jacques A Pienaar, Robert Hundt. JSWhiz: Static analysis for JavaScript memory leaks[C]// Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization. 2013:1-11.
[5]Woosup Lim, Seongsoo Park, Hwansoo Han. Memory leak detection with context awareness[C]// Proceedings of the 2012 ACM Research in Applied Computation Symposium. 2012:276-281.
[6]张威,卢庆龄,李梅,等. 基于指针分析的内存泄露故障测试方法研究[J]. 计算机应用研究, 2006,23(10): 22-24.
[7]付晓毓,朱利,顾伟. 基于模型检测的内存泄露静态测试方法[J]. 微电子学与计算机, 2010,27(10):170-173.
[8]Liang Juishan, Kao Hungwei, Tsao Hanching, et al. Twophase online memory leak detection[C]// APNOMS. 2012:1-4.
[9]Gene Novark, Emery D Berger, Benjamin G Zorn. Efficiently and precisely locating memory leaks and bloat[J]. ACM SIGPLAN Notices, 2009,44(6):397-407.
[10]吴民,涂奉生. Linux下面向函数的动态内存泄漏监测[J]. 计算机工程与应用, 2003,39(6):37-40.
[11]于维英. Linux下内存泄漏的动态跟踪分析[D]. 天津:南开大学, 2006.
[12]汪小林,王振林,孙逸峰,等. 利用虚拟化平台进行内存泄露探测[J]. 计算机学报, 2010,33(3):463-472.
[13]陆伟,朱怡安,张龙妹,等. 一种解决内存泄漏问题的自愈机制[J]. 西北工业大学学报, 2011,29(4):646-651.
[14]Zhu Yian, Li Yue, Xue Jingling, et al. What is system hang and how to handle it[C]// 2012 IEEE 23rd International Symposium on Software Reliability Engineering. 2012:141-150. |