{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T19:01:46Z","timestamp":1772910106174,"version":"3.50.1"},"reference-count":17,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2008,1,29]],"date-time":"2008-01-29T00:00:00Z","timestamp":1201564800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["R01-2006-000-11196-0"],"award-info":[{"award-number":["R01-2006-000-11196-0"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2008,2]]},"abstract":"<jats:p>One scarce resource in embedded systems is memory. Multitasking makes the lack of memory problem even worse. Most current embedded systems, which do not provide virtual memory, simply divide physical memory and evenly assign contiguous memory chunks to multiple applications. Such simple memory management can frequently cause the lack of available memory for some applications, while others are not using the full amount of assigned memory. To overcome inefficiency in current memory management, we present an efficient heap management scheme that allows multiple applications to share heap space. To reduce overall heap memory usage, applications adaptively acquire subheaps out of shared pool of memory and release surplus subheaps to shared pool. As a result, applications see noncontiguous multiple subheaps as a heap in their address space. We target Java applications to implement our heap-sharing scheme in the KVM from Sun Microsystems. To protect fragmented heap space with a limited number of regions in memory protection unit (MPU), we maintain only a limited number of subheaps. We experimentally evaluate our heap management scheme with J2ME MIDP applications. Our static and dynamic schemes reduce heap memory usage, on average, by 30 and 27%, respectively. For both schemes, overheads are kept low. The execution times in our schemes are increased only by 0.01% for static scheme and 0.35% for dynamic scheme, on average.<\/jats:p>","DOI":"10.1145\/1331331.1331337","type":"journal-article","created":{"date-parts":[[2008,2,28]],"date-time":"2008-02-28T14:02:33Z","timestamp":1204207353000},"page":"1-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Shared heap management for memory-limited java virtual machines"],"prefix":"10.1145","volume":"7","author":[{"given":"Yoonseo","family":"Choi","sequence":"first","affiliation":[{"name":"Seoul National University"}]},{"given":"Hwansoo","family":"Han","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Daejeon, Korea"}]}],"member":"320","published-online":{"date-parts":[[2008,1,29]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/581888.581892"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1176760.1176787"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065910.1065943"},{"key":"e_1_2_1_4_1","unstructured":"Insight Software Solutions Inc. MacroExpress\u00ae The Windows Automation Tool. Insight software solutions Inc. http:\/\/www.macros.com.  Insight Software Solutions Inc. MacroExpress \u00ae The Windows Automation Tool. Insight software solutions Inc. http:\/\/www.macros.com."},{"key":"e_1_2_1_5_1","volume-title":"Garbage Collection: Algorithms for Automatic Dynamic Memory management","author":"Johnes R.","year":"1996","unstructured":"Johnes , R. and Lins , R . 1996 . Garbage Collection: Algorithms for Automatic Dynamic Memory management . Wiley , New York . Johnes, R. and Lins, R. 1996. Garbage Collection: Algorithms for Automatic Dynamic Memory management. Wiley, New York."},{"key":"e_1_2_1_6_1","volume-title":"The Art of Computer Programming Volume 1: Fundamental Algorithms","author":"Knuth D. E.","unstructured":"Knuth , D. E. 1997. The Art of Computer Programming Volume 1: Fundamental Algorithms . Second Edition. Addison-Wesley , Reading, MA . Knuth, D. E. 1997. The Art of Computer Programming Volume 1: Fundamental Algorithms. Second Edition. Addison-Wesley, Reading, MA."},{"key":"e_1_2_1_7_1","unstructured":"midlet.org. Wireless Java Download. midlet.org http:\/\/midlet.org.  midlet.org. Wireless Java Download. midlet.org http:\/\/midlet.org."},{"key":"e_1_2_1_8_1","unstructured":"Minoraxis Inc. Mobile games BLOODY GHOST. Minoraxis Inc. http:\/\/www.minoraxis.com\/mobile.html.  Minoraxis Inc. Mobile games BLOODY GHOST. Minoraxis Inc. http:\/\/www.minoraxis.com\/mobile.html."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/362422.362430"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378820"},{"key":"e_1_2_1_11_1","unstructured":"Sloss A. Symes D. and Wright C. 2004. ARM System Developer's Guide. Morgan Kaufmann San Francisco CA.   Sloss A. Symes D. and Wright C. 2004. ARM System Developer's Guide. Morgan Kaufmann San Francisco CA."},{"issue":"0","key":"e_1_2_1_12_1","first-page":"4","article-title":"Connected","volume":"1","author":"Sun Microsystems","year":"2002","unstructured":"Sun Microsystems . 2002 a. Connected , Limited Device Configuration (CLDC) 1 . 0 . 4 . Sun Microsystems, http:\/\/java.sun.com\/j2me. Sun Microsystems. 2002a. Connected, Limited Device Configuration (CLDC) 1.0.4. Sun Microsystems, http:\/\/java.sun.com\/j2me.","journal-title":"Limited Device Configuration (CLDC)"},{"key":"e_1_2_1_13_1","volume-title":"CLDC, Version 1.0.4, Java 2 Platform, Micro Edition. Sun Microsystems","author":"Sun Microsystems","unstructured":"Sun Microsystems . 2002b. KVM Porting Guide , CLDC, Version 1.0.4, Java 2 Platform, Micro Edition. Sun Microsystems , Santa Clara, CA . Sun Microsystems. 2002b. KVM Porting Guide, CLDC, Version 1.0.4, Java 2 Platform, Micro Edition. Sun Microsystems, Santa Clara, CA."},{"key":"e_1_2_1_14_1","unstructured":"Sun Microsystems. 2002c. Mobile Information Device Profile (MIDP) v2.0. Sun Microsystems http:\/\/java.sun.com\/j2me.  Sun Microsystems. 2002c. Mobile Information Device Profile (MIDP) v2.0. Sun Microsystems http:\/\/java.sun.com\/j2me."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/40.798109"},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of International Workshop on Memory Management.","author":"Wilson P. R.","unstructured":"Wilson , P. R. , Johnstone , M. S. , Neely , M. , and Boles , D . 1995. Dynamic storage allocation: A survey and critical review . In Proceedings of International Workshop on Memory Management. Wilson, P. R., Johnstone, M. S., Neely, M., and Boles, D. 1995. Dynamic storage allocation: A survey and critical review. In Proceedings of International Workshop on Memory Management."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029873.1029881"}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1331331.1331337","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1331331.1331337","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:27Z","timestamp":1750278147000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1331331.1331337"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1,29]]},"references-count":17,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2008,2]]}},"alternative-id":["10.1145\/1331331.1331337"],"URL":"https:\/\/doi.org\/10.1145\/1331331.1331337","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"value":"1539-9087","type":"print"},{"value":"1558-3465","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,1,29]]},"assertion":[{"value":"2007-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2007-06-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-01-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}