Loading…

The Perfect Getaway: Using Escape Analysis in Embedded Real-Time Systems

The use of a managed, type-safe language such as Java in real-time and embedded systems offers productivity and, in particular, safety and dependability benefits at a reasonable cost. It has been shown for commodity systems that Escape Analysis (EA) enables a set of useful optimizations, and benefit...

Full description

Saved in:
Bibliographic Details
Published in:ACM transactions on embedded computing systems 2017-11, Vol.16 (4), p.1-30
Main Authors: Stilkerich, Isabella, Lang, Clemens, Erhardt, Christoph, Bay, Christian, Stilkerich, Michael
Format: Article
Language:English
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites cdi_FETCH-LOGICAL-c187t-3e9e47262df8e28bff83836e86b1af5ca4043833859453facee677cf0710ce9d3
container_end_page 30
container_issue 4
container_start_page 1
container_title ACM transactions on embedded computing systems
container_volume 16
creator Stilkerich, Isabella
Lang, Clemens
Erhardt, Christoph
Bay, Christian
Stilkerich, Michael
description The use of a managed, type-safe language such as Java in real-time and embedded systems offers productivity and, in particular, safety and dependability benefits at a reasonable cost. It has been shown for commodity systems that Escape Analysis (EA) enables a set of useful optimizations, and benefits from the properties of a type-safe language. In this article, we explore the application of escape analysis in KESO [Stilkerich et al. 2012], a Java ahead-of-time compiler targeting embedded real-time systems. We present specific applications of EA for embedded programs that go beyond the widely known stack-allocation and synchronization optimizations such as extended remote-procedure-call (RPC) support for software-isolated applications, automated inference of immutable data, or improved upper space and time bounds for worst-case estimations.
doi_str_mv 10.1145/3035542
format article
fullrecord <record><control><sourceid>crossref</sourceid><recordid>TN_cdi_crossref_primary_10_1145_3035542</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_1145_3035542</sourcerecordid><originalsourceid>FETCH-LOGICAL-c187t-3e9e47262df8e28bff83836e86b1af5ca4043833859453facee677cf0710ce9d3</originalsourceid><addsrcrecordid>eNotj8FKQzEQRYMoWKu48Ae6cxWdyWSSyVKKtkJBF3X9SNMJKoqSPJD-vRa7OpezuHCMuUS4QfR8S0DM3h2ZCTKLJR_4eL8p2QQST81Z7-8AGJ3niblav-rsWVvVMs4WOuafvDs3JzV_dL04cGpeHu7X86VdPS0e53crW1DiaEmT-uiC21ZRJ5tahYSCSthgrlyyB_8nSDh5ppqLaoixVIgIRdOWpub6_7e0r96b1uG7vX3mthsQhn3LcGihX74qOOY</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>The Perfect Getaway: Using Escape Analysis in Embedded Real-Time Systems</title><source>Association for Computing Machinery:Jisc Collections:ACM OPEN Journals 2023-2025 (reading list)</source><creator>Stilkerich, Isabella ; Lang, Clemens ; Erhardt, Christoph ; Bay, Christian ; Stilkerich, Michael</creator><creatorcontrib>Stilkerich, Isabella ; Lang, Clemens ; Erhardt, Christoph ; Bay, Christian ; Stilkerich, Michael</creatorcontrib><description>The use of a managed, type-safe language such as Java in real-time and embedded systems offers productivity and, in particular, safety and dependability benefits at a reasonable cost. It has been shown for commodity systems that Escape Analysis (EA) enables a set of useful optimizations, and benefits from the properties of a type-safe language. In this article, we explore the application of escape analysis in KESO [Stilkerich et al. 2012], a Java ahead-of-time compiler targeting embedded real-time systems. We present specific applications of EA for embedded programs that go beyond the widely known stack-allocation and synchronization optimizations such as extended remote-procedure-call (RPC) support for software-isolated applications, automated inference of immutable data, or improved upper space and time bounds for worst-case estimations.</description><identifier>ISSN: 1539-9087</identifier><identifier>EISSN: 1558-3465</identifier><identifier>DOI: 10.1145/3035542</identifier><language>eng</language><ispartof>ACM transactions on embedded computing systems, 2017-11, Vol.16 (4), p.1-30</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c187t-3e9e47262df8e28bff83836e86b1af5ca4043833859453facee677cf0710ce9d3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Stilkerich, Isabella</creatorcontrib><creatorcontrib>Lang, Clemens</creatorcontrib><creatorcontrib>Erhardt, Christoph</creatorcontrib><creatorcontrib>Bay, Christian</creatorcontrib><creatorcontrib>Stilkerich, Michael</creatorcontrib><title>The Perfect Getaway: Using Escape Analysis in Embedded Real-Time Systems</title><title>ACM transactions on embedded computing systems</title><description>The use of a managed, type-safe language such as Java in real-time and embedded systems offers productivity and, in particular, safety and dependability benefits at a reasonable cost. It has been shown for commodity systems that Escape Analysis (EA) enables a set of useful optimizations, and benefits from the properties of a type-safe language. In this article, we explore the application of escape analysis in KESO [Stilkerich et al. 2012], a Java ahead-of-time compiler targeting embedded real-time systems. We present specific applications of EA for embedded programs that go beyond the widely known stack-allocation and synchronization optimizations such as extended remote-procedure-call (RPC) support for software-isolated applications, automated inference of immutable data, or improved upper space and time bounds for worst-case estimations.</description><issn>1539-9087</issn><issn>1558-3465</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><recordid>eNotj8FKQzEQRYMoWKu48Ae6cxWdyWSSyVKKtkJBF3X9SNMJKoqSPJD-vRa7OpezuHCMuUS4QfR8S0DM3h2ZCTKLJR_4eL8p2QQST81Z7-8AGJ3niblav-rsWVvVMs4WOuafvDs3JzV_dL04cGpeHu7X86VdPS0e53crW1DiaEmT-uiC21ZRJ5tahYSCSthgrlyyB_8nSDh5ppqLaoixVIgIRdOWpub6_7e0r96b1uG7vX3mthsQhn3LcGihX74qOOY</recordid><startdate>20171130</startdate><enddate>20171130</enddate><creator>Stilkerich, Isabella</creator><creator>Lang, Clemens</creator><creator>Erhardt, Christoph</creator><creator>Bay, Christian</creator><creator>Stilkerich, Michael</creator><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20171130</creationdate><title>The Perfect Getaway</title><author>Stilkerich, Isabella ; Lang, Clemens ; Erhardt, Christoph ; Bay, Christian ; Stilkerich, Michael</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c187t-3e9e47262df8e28bff83836e86b1af5ca4043833859453facee677cf0710ce9d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Stilkerich, Isabella</creatorcontrib><creatorcontrib>Lang, Clemens</creatorcontrib><creatorcontrib>Erhardt, Christoph</creatorcontrib><creatorcontrib>Bay, Christian</creatorcontrib><creatorcontrib>Stilkerich, Michael</creatorcontrib><collection>CrossRef</collection><jtitle>ACM transactions on embedded computing systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Stilkerich, Isabella</au><au>Lang, Clemens</au><au>Erhardt, Christoph</au><au>Bay, Christian</au><au>Stilkerich, Michael</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>The Perfect Getaway: Using Escape Analysis in Embedded Real-Time Systems</atitle><jtitle>ACM transactions on embedded computing systems</jtitle><date>2017-11-30</date><risdate>2017</risdate><volume>16</volume><issue>4</issue><spage>1</spage><epage>30</epage><pages>1-30</pages><issn>1539-9087</issn><eissn>1558-3465</eissn><abstract>The use of a managed, type-safe language such as Java in real-time and embedded systems offers productivity and, in particular, safety and dependability benefits at a reasonable cost. It has been shown for commodity systems that Escape Analysis (EA) enables a set of useful optimizations, and benefits from the properties of a type-safe language. In this article, we explore the application of escape analysis in KESO [Stilkerich et al. 2012], a Java ahead-of-time compiler targeting embedded real-time systems. We present specific applications of EA for embedded programs that go beyond the widely known stack-allocation and synchronization optimizations such as extended remote-procedure-call (RPC) support for software-isolated applications, automated inference of immutable data, or improved upper space and time bounds for worst-case estimations.</abstract><doi>10.1145/3035542</doi><tpages>30</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1539-9087
ispartof ACM transactions on embedded computing systems, 2017-11, Vol.16 (4), p.1-30
issn 1539-9087
1558-3465
language eng
recordid cdi_crossref_primary_10_1145_3035542
source Association for Computing Machinery:Jisc Collections:ACM OPEN Journals 2023-2025 (reading list)
title The Perfect Getaway: Using Escape Analysis in Embedded Real-Time Systems
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T16%3A48%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=The%20Perfect%20Getaway:%20Using%20Escape%20Analysis%20in%20Embedded%20Real-Time%20Systems&rft.jtitle=ACM%20transactions%20on%20embedded%20computing%20systems&rft.au=Stilkerich,%20Isabella&rft.date=2017-11-30&rft.volume=16&rft.issue=4&rft.spage=1&rft.epage=30&rft.pages=1-30&rft.issn=1539-9087&rft.eissn=1558-3465&rft_id=info:doi/10.1145/3035542&rft_dat=%3Ccrossref%3E10_1145_3035542%3C/crossref%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c187t-3e9e47262df8e28bff83836e86b1af5ca4043833859453facee677cf0710ce9d3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true