良心 发表于 2025-3-28 16:28:49
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/e/image/300294.jpgetiquette 发表于 2025-3-28 21:10:44
http://reply.papertrans.cn/31/3003/300294/300294_42.png龙卷风 发表于 2025-3-29 02:15:51
, Scalable Source Code Queries with DatalogIt combines two previous proposals, namely the use of logic programming and database systems..As the query language we use ., which was originally introduced in the theory of databases. That provides just the right level of expressiveness; in particular recursion is indispensable for source code que遵循的规范 发表于 2025-3-29 05:00:47
http://reply.papertrans.cn/31/3003/300294/300294_44.png消散 发表于 2025-3-29 08:21:17
Automatic Prefetching by Traversal Profiling in Object Persistence Architecturesn . associated objects as part of the query result. While specifying prefetch manually in a query can significantly improve performance, correct prefetch specifications are difficult to determine and maintain, especially in modular programs. Incorrect prefetching is difficult to detect, because prefMOTIF 发表于 2025-3-29 15:25:34
The Runtime Structure of Object Ownershipnd large caches. Discovering this is quite challenging. Manual browsing and flat summaries do not scale to complex graphs with 20 million objects. Context is crucial to understanding responsibility and inefficient object connectivity..We summarize memory footprint with help from the dominator relatiGUILT 发表于 2025-3-29 18:03:36
On Ownership and Accessibility systems impose fixed ownership and an inflexible access policy. This paper proposes a novel type system which generalizes ownership types by separating object accessibility and reference capability. With the ability to hide owners, it provides a more flexible and useful model of object ownership.aqueduct 发表于 2025-3-29 21:10:47
http://reply.papertrans.cn/31/3003/300294/300294_48.pngFlatter 发表于 2025-3-30 00:21:23
Transparently Reconciling Transactions with Locking for Java Synchronizationations performed while the lock is held, so that the lock’s guarded operations can never be interleaved with operations of other threads that are guarded by the same lock. This way both . and . properties of a thread’s guarded operations are enforced. Recent proposals recognize that these properties骚动 发表于 2025-3-30 07:28:09
Peak Objectsedium-sized systems, including a widely-used text editor, CASE and VLSI tools. Stated simply, I wanted flexible connections between providers and consumers of behavior in my systems. For example, in the text editor anything could produce text (files, in-memory buffers, selections, output of formatte