View : 659 Download: 0

Full metadata record

DC Field Value Language
dc.contributor.author최병주*
dc.date.accessioned2016-08-29T12:08:24Z-
dc.date.available2016-08-29T12:08:24Z-
dc.date.issued2012*
dc.identifier.issn2005-4297*
dc.identifier.otherOAK-18219*
dc.identifier.urihttps://dspace.ewha.ac.kr/handle/2015.oak/231314-
dc.description.abstractSince open platforms such as Android vary in device manufacturers and application developers, modifications in software happened in multiple layers. Therefore, every layer including OS, library, framework and application may have defects within. Especially, a memory leakage which increases memory usage and diminish overall system performance is the key issue in embedded systems with highly limited resources. In this paper, we suggest a technique that detects memory leakage by gathering memory execution information in run-time via PCB hooking and apply this technique to actual Android smartphones. The suggested technique does not require a target source code and any hardware changes for memory leakage detection, and it is characterized by maintaining the same target runtime status even in detecting while minimizing performance overhead simultaneously. We implemented an automated tool of this technique for Android Smartphone, and show that it is effective.*
dc.languageEnglish*
dc.titleAutomated Memory Leakage Detection in Android Based Systems*
dc.typeArticle*
dc.relation.issue2*
dc.relation.volume5*
dc.relation.indexSCOPUS*
dc.relation.startpage35*
dc.relation.lastpage42*
dc.relation.journaltitleInternational Journal of Control and Automation*
dc.identifier.scopusid2-s2.0-84864019494*
dc.author.googlePark J.*
dc.author.googleChoi B.*
dc.contributor.scopusid최병주(7402755545)*
dc.date.modifydate20240322133149*
Appears in Collections:
인공지능대학 > 컴퓨터공학과 > Journal papers
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

BROWSE