Eliminating garbage collection for embedded real-time software

Nader Mohamed, Jameela Al-Jaroodi

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)

    Abstract

    One of the problems with Java for real-time and embedded real-time systems is the unpredictable behavior of garbage collection (GC). GC introduces unexpected load and causes undesirable delays for real-time applications. In this paper, we propose a technique that reduces and bounds the memory requirements for real-time and embedded Java programs. This technique eliminates the need for GC and allows for a more deterministic execution behavior and efficient utilization of the available memory. A number of benchmark tests are used to evaluate this technique in PERC, NewMonics' real-time JVM, and Sun's JVM. The results show that GC can be eliminated and an application's execution time decreases and becomes more deterministic. In addition, we briefly introduce a framework to automate the technique.

    Original languageEnglish
    Title of host publicationProceedings of the 2005 International Conference on Embedded Systems and Applications, ESA'05
    Pages10-16
    Number of pages7
    Publication statusPublished - Dec 1 2005
    Event2005 International Conference on Embedded Systems and Applications, ESA'05 - Las Vegas, NV, United States
    Duration: Jun 27 2005Jun 30 2005

    Publication series

    NameProceedings of the 2005 International Conference on Embedded Systems and Applications, ESA'05

    Other

    Other2005 International Conference on Embedded Systems and Applications, ESA'05
    Country/TerritoryUnited States
    CityLas Vegas, NV
    Period6/27/056/30/05

    Keywords

    • Applications
    • Embedded real-time
    • Garbage collection
    • Java

    ASJC Scopus subject areas

    • Artificial Intelligence
    • Hardware and Architecture
    • Control and Systems Engineering

    Fingerprint

    Dive into the research topics of 'Eliminating garbage collection for embedded real-time software'. Together they form a unique fingerprint.

    Cite this