Design patterns: elements of reusable object-oriented software
Design patterns: elements of reusable object-oriented software
Programming with non-heap memory in the real time specification for Java
OOPSLA '03 Companion of the 18th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Hard real-time: C++ versus RTSJ
OOPSLA '04 Companion to the 19th annual ACM SIGPLAN conference on Object-oriented programming systems, languages, and applications
Scoped Types for Real-Time Java
RTSS '04 Proceedings of the 25th IEEE International Real-Time Systems Symposium
Java In A Nutshell, 5th Edition
Java In A Nutshell, 5th Edition
Toward Libraries for Real-Time Java
ISORC '08 Proceedings of the 2008 11th IEEE Symposium on Object Oriented Real-Time Distributed Computing
Memory management for safety-critical Java
Proceedings of the 9th International Workshop on Java Technologies for Real-Time and Embedded Systems
Safety-critical Java on a Java processor
Proceedings of the 10th International Workshop on Java Technologies for Real-time and Embedded Systems
Exploiting slicing and patterns for RTSJ immortal memory optimization
Proceedings of the 2013 International Conference on Principles and Practices of Programming on the Java Platform: Virtual Machines, Languages, and Tools
Worst-case memory consumption analysis for SCJ
Proceedings of the 11th International Workshop on Java Technologies for Real-time and Embedded Systems
Hi-index | 0.00 |
Scoped memories are introduced in real-time Java profiles in order to make object allocation and deallocation time and space predictable. However, explicit scoping requires care from programmers when dealing with temporary objects, passing scope-allocated objects as arguments to methods, and returning scope-allocated objects from methods. To simplify the correct usage of scopes, programming patterns may be helpful. We present patterns for simple subroutines, sequences of subroutine calls, and nested calls, where the patterns avoid memory leaks and unnecessary copying of values. The patterns are illustrated by implementations in the safety-critical Java profile.