A Systematic Mapping Study on High-level Language Virtual Machines - - PowerPoint PPT Presentation

a systematic mapping study on high level language virtual
SMART_READER_LITE
LIVE PREVIEW

A Systematic Mapping Study on High-level Language Virtual Machines - - PowerPoint PPT Presentation

Motivation Systematic Mapping Threats to Validity Concluding Remarks A Systematic Mapping Study on High-level Language Virtual Machines Vinicius H. S. Durelli, Katia R. Felizardo, and Marcio E. Delamaro Computer Systems Department


slide-1
SLIDE 1

Motivation Systematic Mapping Threats to Validity Concluding Remarks

A Systematic Mapping Study on High-level Language Virtual Machines

Vinicius H. S. Durelli, Katia R. Felizardo, and Marcio E. Delamaro

Computer Systems Department University of S˜ ao Paulo (ICMC-USP) 13560-970 – S˜ ao Carlos – SP – Brazil {durelli,katiarf,delamaro}@icmc.usp.br

October 17, 2010

1 / 24

slide-2
SLIDE 2

Motivation Systematic Mapping Threats to Validity Concluding Remarks

Agenda

1 Motivation

Research on HLL VMs First Step Towards Filling in Such a Gap

2 Systematic Mapping

Overview Steps Data Extraction and Mapping

3 Threats to Validity 4 Concluding Remarks

2 / 24

slide-3
SLIDE 3

Motivation Systematic Mapping Threats to Validity Concluding Remarks Research on HLL VMs First Step Towards Filling in Such a Gap

Research on High-level Language Virtual Machines

A great deal of the contemporary high-level languages have their execution environment based upon high-level language virtual machines (HLL VMs). There is a large body of literature on research in virtual machine for high-level languages.

A mature research area means a sharp increase in the number of results made available, thus it becomes essential to summarize and provide an

  • verview of such area.

To the best of our knowledge there are no comprehensive studies focusing on an overview of this research area and its most investigated subjects.

3 / 24

slide-4
SLIDE 4

Motivation Systematic Mapping Threats to Validity Concluding Remarks Research on HLL VMs First Step Towards Filling in Such a Gap

Motivation: First Step Towards Filling in Such Gap

In order to fill in such a gap it is needed to ascertain the nature, extent, and quantity of published research papers. Contributions:

1 Areas that have been most subjected to investigation.

Side effect: Areas that require further research.

2 The relevant publication forums. 3 HLL VM implementations that are the most widely used

within the academic community.

4 / 24

slide-5
SLIDE 5

Motivation Systematic Mapping Threats to Validity Concluding Remarks Overview Steps Data Extraction and Mapping

Evidence-based Paradigm

Definition → Systematic Mapping Methodology that involves searching the literature in order to aggre- gate and categorize primary studies, thereby yielding a synthesized view of the research area under consideration [Petersen et al., 2008]. Advantages: The approach used for searching and inclusion and exclusion criteria are defined in a research protocol and reported as an outcome. Side effects: Transparent; Replicable; Updatable.

5 / 24

slide-6
SLIDE 6

Motivation Systematic Mapping Threats to Validity Concluding Remarks Overview Steps Data Extraction and Mapping

Systematic Mapping Process: Overview

Figure: The systematic mapping process [Petersen et al., 2008].

6 / 24

slide-7
SLIDE 7

Motivation Systematic Mapping Threats to Validity Concluding Remarks Overview Steps Data Extraction and Mapping

Research Questions

Research questions must embody the mapping study purpose. RQ1: which functionalities/features/characteristics of HLL VMs have been most investigated? RQ2: which are the mainstream HLL VM implementations within the academic community?

7 / 24

slide-8
SLIDE 8

Motivation Systematic Mapping Threats to Validity Concluding Remarks Overview Steps Data Extraction and Mapping

Search for Primary Studies

Search String → combination of these keywords and acronyms virtual machine, VM, high-level language virtual machine, and HLL VM. We used the search string on the following electronic databases: ACM Digital Library, EngineeringVillage, IEEE Xplore, Springer Lecture Notes in Computer Science (LNCS), and ScienceDirect. No limits were placed on date of publication.

8 / 24

slide-9
SLIDE 9

Motivation Systematic Mapping Threats to Validity Concluding Remarks Overview Steps Data Extraction and Mapping

Screening: Inclusion Criteria

The inclusion criteria devised and applied are: if several papers reported similar studies, only the most recent was selected; papers describing more than one study had each study individually evaluated; it has to describe at least a prototypical implementation of the proposed improvement, thereby mentioning the HLL VM implementation that was modified.

9 / 24

slide-10
SLIDE 10

Motivation Systematic Mapping Threats to Validity Concluding Remarks Overview Steps Data Extraction and Mapping

Screening: Exclusion Criteria (i)

and the following exclusion criteria: papers that do not present studies pertaining to HLL VMs, e.g., papers describing research on system VMs; studies describing the introduction of improvements that consist in solely modifying the intermediate language of the HLL VM under consideration; studies whose proposed enhancements do not imply in making changes to the underlying HLL VM, e.g., papers describing features implemented atop HLL VMs;

10 / 24

slide-11
SLIDE 11

Motivation Systematic Mapping Threats to Validity Concluding Remarks Overview Steps Data Extraction and Mapping

Screening: Exclusion Criteria (ii)

studies whose target HLL VM is either a co-designed (e.g., composed of both software and hardware portions) or an entirely implemented in hardware HLL VM; technical reports, documents that are available in the form

  • f either abstracts or presentations (i.e., elements of “grey”

literature), and secondary literature reviews (i.e., mapping studies).

11 / 24

slide-12
SLIDE 12

Motivation Systematic Mapping Threats to Validity Concluding Remarks Overview Steps Data Extraction and Mapping

Final Set of Selected Primary Studies

Electronic Database Number ACM Digital Library 1554 EngineeringVillage 1395 IEEE Xplore 309 Springer LNCS 640 ScienceDirect 1123 Total 5021 Candidates 142 Final set 128

Table: Papers retrieved from each electronic database, total of candidate studies, and the final set.

12 / 24

slide-13
SLIDE 13

Motivation Systematic Mapping Threats to Validity Concluding Remarks Overview Steps Data Extraction and Mapping

Keywording

The aim of this step is to devise our own classification scheme and categories for the selected primary studies. Certain sections are read for the purpose of finding keywords and concepts that reflect their contribution.

13 / 24

slide-14
SLIDE 14

Motivation Systematic Mapping Threats to Validity Concluding Remarks Overview Steps Data Extraction and Mapping

Resulting Categories

Categories Optimization Garbage Collection (GC) Debugging Memory Leak Tolerance (MLT) New Language Construct (NLC) Profiling Aspect-Oriented Programming (AOP) Embedded System (ES) Security Real-Time Distributed Computing (DC) Fault Tolerance (FT) Resource Sharing among HLL VMs (RSVM) Testing

14 / 24

slide-15
SLIDE 15

Motivation Systematic Mapping Threats to Validity Concluding Remarks Overview Steps Data Extraction and Mapping

Resulting Category Frequencies

T e s t i n g R S V M M L T S e c u r i t y N L C F T D C D e b u g g i n g A O P P r

  • f

i l i n g R e a l

  • T

i m e E S G C O p t i m i z a t i

  • n

Category 5 10 15 20 25 30 35 Frequency 2 2 2 3 4 4 7 8 8 9 13 24 33 34

Figure: Frequency of studies in each category*.

∗Certain studies were grouped in more than one category

15 / 24

slide-16
SLIDE 16

Motivation Systematic Mapping Threats to Validity Concluding Remarks Overview Steps Data Extraction and Mapping

Most Researched Subjects Evolution

According to our results, these are the “trendy” subjects:

1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 Year 1 2 3 4 5 6 7 Frequency

Optimization GC ES

Figure: Year-wise distribution of publications on the most investigated categories.

16 / 24

slide-17
SLIDE 17

Motivation Systematic Mapping Threats to Validity Concluding Remarks Overview Steps Data Extraction and Mapping

Distribution of Primary Studies by Electronic Database

EngineeringVillage 30.0% ACM Digital Library 48.0% Springer LNCS 13.0% IEEE Xplore 9.0%

Electronic Databases

Electronic Database Number ACM Digital Library 62 EngineeringVillage 38 Springer LNCS 16 IEEE Xplore 12 ScienceDirect

17 / 24

slide-18
SLIDE 18

Motivation Systematic Mapping Threats to Validity Concluding Remarks Overview Steps Data Extraction and Mapping

Distribution of Primary Studies by Publication Type

Conference 36.0% Journal 24.0% Symposium 20.0% Book Chapter 14.0% Workshop 6.0%

Publication Type

Publication Type Number Conference 46 Journal 31 Symposium 25 Book Chapter 18 Workshop 8

18 / 24

slide-19
SLIDE 19

Motivation Systematic Mapping Threats to Validity Concluding Remarks Overview Steps Data Extraction and Mapping

Map: Year-Wise Distribution (detailed)

1 9 9 9 1 9 9 8 2 2 2 3 2 2 1 2 6 2 7 2 4 2 5 2 8 2 9 2 1 FT NLC DC Optimization GC MLT Real-Time Security ES Debugging RSVM Profiling Testing AOP

1 1 1 2 3 1 2 1 1 4 2 1 1 1 1 3 1 1 2 1 1 2 1 2 1 4 5 1 4 3 4 2 7 1 1 1 1 3 3 1 5 2 5 2 1 1 1 3 2 2 6 4 1 3 2 6 1 1 2 3 1 2 1 3 3 4 1 1 1 1 1 1 1

Map

19 / 24

slide-20
SLIDE 20

Motivation Systematic Mapping Threats to Validity Concluding Remarks Overview Steps Data Extraction and Mapping

Map: The Most-Widely Used HLL VM Implementations

G F

  • r

t h V M * S a b l e V M C V M H a r m

  • n

y S i m p l e R T J O C V M V M K i t J i k e s R V M I B M ' s J 2 M E M O N O H

  • t

S p

  • t

J E S S I C A 2 C A C A O T c l V M J e R T y S t e a m l

  • m

K a f f e C L R E x a c t V M J a m a i c a M a x i n e J I T S J 9 I V M C E J V M K V M O R P S I C S t u s J a m V M O V M FT NLC DC Optimization GC MLT Real-Time Security ES Debugging RSVM Profiling Testing AOP

12 1 1 1 6 1 3 3 2 3 1 4 2 1 1 1 1 1 5 2 2 1 3 1 1 1 1 1 1 3 1 1 1 2 12 3 4 1 2 1 1 3 1 1 1 1 1 2 1 2 2 1 3 5 5 2 3 1 2 1 1 1 1 2 1 1 1 1 1 1 2 2

Map

20 / 24

slide-21
SLIDE 21

Motivation Systematic Mapping Threats to Validity Concluding Remarks

Threats to Validity

We cannot rule out threats from a quality assessment perspective.

(We wanted to be as inclusive as possible) We simply selected studies without assigning any scores.

Another threat consists in whether we have properly identified and selected all relevant publications. Whether our resulting classification scheme and cate- gories are coherent also represents a threat to validity.

21 / 24

slide-22
SLIDE 22

Motivation Systematic Mapping Threats to Validity Concluding Remarks

Concluding Remarks

The mapping study results, although not entirely surprising (some may argue), can be used to support several claims that are frequently made but not scientifically backed up. Our mapping study reveals that the majority of research into HLL VMs focuses on optimizing these execution environments, improving their memory management capa- bilities, and tailoring them to resource-constrained settings. As for the publication types, the majority of the studies are conference publications. Another contribution of this paper is the map we have created.

22 / 24

slide-23
SLIDE 23

Motivation Systematic Mapping Threats to Validity Concluding Remarks

References

  • K. Petersen, R. Feldt, S. Mujtaba, and M. Mattsson.

Systematic Mapping Studies in Software Engineering. 12th International Conference on Evaluation and Assessment in Software Engineering (EASE), pages 71–80, 2008

  • J. E. Smith and R. Nair

The Architecture of Virtual Machines. Computer 38(5):32–38, 2005.

  • J. E. Smith and R. Nair

Virtual Machines: Versatile Platforms for Systems and Processes. Morgan Kaufmann, 656 pages, 2005.

23 / 24

slide-24
SLIDE 24

Motivation Systematic Mapping Threats to Validity Concluding Remarks

A Systematic Mapping Study on High-level Language Virtual Machines

Vinicius H. S. Durelli, Katia R. Felizardo, and Marcio E. Delamaro

Computer Systems Department University of S˜ ao Paulo (ICMC-USP) 13560-970 – S˜ ao Carlos – SP – Brazil {durelli,katiarf,delamaro}@icmc.usp.br

October 17, 2010

24 / 24