a systematic mapping study on high level language virtual
play

A Systematic Mapping Study on High-level Language Virtual Machines - PowerPoint PPT Presentation

Motivation Systematic Mapping Threats to Validity Concluding Remarks A Systematic Mapping Study on High-level Language Virtual Machines Vinicius H. S. Durelli, Katia R. Felizardo, and Marcio E. Delamaro Computer Systems Department


  1. Motivation Systematic Mapping Threats to Validity Concluding Remarks A Systematic Mapping Study on High-level Language Virtual Machines Vinicius H. S. Durelli, Katia R. Felizardo, and Marcio E. Delamaro Computer Systems Department University of S˜ ao Paulo (ICMC-USP) 13560-970 – S˜ ao Carlos – SP – Brazil { durelli,katiarf,delamaro } @icmc.usp.br October 17, 2010 1 / 24

  2. Motivation Systematic Mapping Threats to Validity Concluding Remarks Agenda 1 Motivation Research on HLL VMs First Step Towards Filling in Such a Gap 2 Systematic Mapping Overview Steps Data Extraction and Mapping 3 Threats to Validity 4 Concluding Remarks 2 / 24

  3. Motivation Systematic Mapping Research on HLL VMs Threats to Validity First Step Towards Filling in Such a Gap Concluding Remarks Research on High-level Language Virtual Machines A great deal of the contemporary high-level languages have their execution environment based upon high-level language virtual machines (HLL VMs). There is a large body of literature on research in virtual machine for high-level languages. A mature research area means a sharp increase in the number of results made available, thus it becomes essential to summarize and provide an overview of such area. To the best of our knowledge there are no comprehensive studies focusing on an overview of this research area and its most investigated subjects. 3 / 24

  4. Motivation Systematic Mapping Research on HLL VMs Threats to Validity First Step Towards Filling in Such a Gap Concluding Remarks Motivation: First Step Towards Filling in Such Gap In order to fill in such a gap it is needed to ascertain the nature , extent , and quantity of published research papers. Contributions: 1 Areas that have been most subjected to investigation. Side effect: Areas that require further research. 2 The relevant publication forums. 3 HLL VM implementations that are the most widely used within the academic community. 4 / 24

  5. Motivation Overview Systematic Mapping Steps Threats to Validity Data Extraction and Mapping Concluding Remarks Evidence-based Paradigm Definition → Systematic Mapping Methodology that involves searching the literature in order to aggre- gate and categorize primary studies, thereby yielding a synthesized view of the research area under consideration [Petersen et al., 2008]. Advantages: The approach used for searching and inclusion and exclusion criteria are defined in a research protocol and reported as an outcome. Side effects: Transparent; Replicable; Updatable. 5 / 24

  6. Motivation Overview Systematic Mapping Steps Threats to Validity Data Extraction and Mapping Concluding Remarks Systematic Mapping Process: Overview Figure: The systematic mapping process [Petersen et al., 2008]. 6 / 24

  7. Motivation Overview Systematic Mapping Steps Threats to Validity Data Extraction and Mapping Concluding Remarks Research Questions Research questions must embody the mapping study purpose . RQ 1 : which functionalities/features/characteristics of HLL VMs have been most investigated? RQ 2 : which are the mainstream HLL VM implementations within the academic community? 7 / 24

  8. Motivation Overview Systematic Mapping Steps Threats to Validity Data Extraction and Mapping Concluding Remarks Search for Primary Studies Search String → combination of these keywords and acronyms virtual machine, VM, high-level language virtual machine, and HLL VM . We used the search string on the following electronic databases : ACM Digital Library, EngineeringVillage, IEEE Xplore, Springer Lecture Notes in Computer Science (LNCS), and ScienceDirect. No limits were placed on date of publication . 8 / 24

  9. Motivation Overview Systematic Mapping Steps Threats to Validity Data Extraction and Mapping Concluding Remarks Screening : Inclusion Criteria The inclusion criteria devised and applied are: if several papers reported similar studies, only the most recent was selected; papers describing more than one study had each study individually evaluated; it has to describe at least a prototypical implementation of the proposed improvement, thereby mentioning the HLL VM implementation that was modified. 9 / 24

  10. Motivation Overview Systematic Mapping Steps Threats to Validity Data Extraction and Mapping Concluding Remarks Screening : Exclusion Criteria (i) and the following exclusion criteria: papers that do not present studies pertaining to HLL VMs, e.g., papers describing research on system VMs; studies describing the introduction of improvements that consist in solely modifying the intermediate language of the HLL VM under consideration; studies whose proposed enhancements do not imply in making changes to the underlying HLL VM, e.g., papers describing features implemented atop HLL VMs; 10 / 24

  11. Motivation Overview Systematic Mapping Steps Threats to Validity Data Extraction and Mapping Concluding Remarks Screening : Exclusion Criteria (ii) studies whose target HLL VM is either a co-designed (e.g., composed of both software and hardware portions) or an entirely implemented in hardware HLL VM; technical reports, documents that are available in the form of either abstracts or presentations (i.e., elements of “grey” literature), and secondary literature reviews (i.e., mapping studies). 11 / 24

  12. Motivation Overview Systematic Mapping Steps Threats to Validity Data Extraction and Mapping Concluding Remarks Final Set of Selected Primary Studies Electronic Database Number ACM Digital Library 1554 EngineeringVillage 1395 IEEE Xplore 309 Springer LNCS 640 ScienceDirect 1123 Total 5021 Candidates 142 Final set 128 Table: Papers retrieved from each electronic database, total of candidate studies, and the final set. 12 / 24

  13. Motivation Overview Systematic Mapping Steps Threats to Validity Data Extraction and Mapping Concluding Remarks Keywording The aim of this step is to devise our own classification scheme and categories for the selected primary studies. Certain sections are read for the purpose of finding keywords and concepts that reflect their contribution. 13 / 24

  14. Motivation Overview Systematic Mapping Steps Threats to Validity Data Extraction and Mapping Concluding Remarks Resulting Categories Categories Optimization Garbage Collection (GC) Debugging Memory Leak Tolerance (MLT) New Language Construct (NLC) Profiling Aspect-Oriented Programming (AOP) Embedded System (ES) Security Real-Time Distributed Computing (DC) Fault Tolerance (FT) Resource Sharing among HLL VMs (RSVM) Testing 14 / 24

  15. Motivation Overview Systematic Mapping Steps Threats to Validity Data Extraction and Mapping Concluding Remarks Resulting Category Frequencies 35 34 33 30 25 24 Frequency 20 15 13 10 9 8 8 7 5 4 4 3 2 2 2 0 g M T y C T C g P g e S C n n L L F D n n m E V M i t O G o t i S r N g i A l i i t i s R u g f i T a e c o l - z T e u r a i S b P e m e R D t i p O Category Figure: Frequency of studies in each category*. ∗ Certain studies were grouped in more than one category 15 / 24

  16. Motivation Overview Systematic Mapping Steps Threats to Validity Data Extraction and Mapping Concluding Remarks Most Researched Subjects Evolution According to our results, these are the “trendy” subjects: 7 Optimization GC 6 ES 5 Frequency 4 3 2 1 0 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 Year Figure: Year-wise distribution of publications on the most investigated categories. 16 / 24

  17. Motivation Overview Systematic Mapping Steps Threats to Validity Data Extraction and Mapping Concluding Remarks Distribution of Primary Studies by Electronic Database Electronic Databases EngineeringVillage Electronic Database Number ACM Digital Library 62 30.0% EngineeringVillage 38 Springer LNCS 16 48.0% IEEE Xplore 12 ACM 9.0% Digital IEEE Xplore ScienceDirect 0 Library 13.0% Springer LNCS 17 / 24

  18. Motivation Overview Systematic Mapping Steps Threats to Validity Data Extraction and Mapping Concluding Remarks Distribution of Primary Studies by Publication Type Publication Type Conference Publication Type Number 36.0% Conference 46 Journal 31 Journal 24.0% Symposium 25 6.0% Book Chapter 18 Workshop Workshop 8 14.0% 20.0% Book Chapter Symposium 18 / 24

  19. Motivation Overview Systematic Mapping Steps Threats to Validity Data Extraction and Mapping Concluding Remarks Map: Year-Wise Distribution (detailed) Map 1 1 RSVM 1 1 MLT 1 1 4 1 2 4 3 5 6 3 3 GC 1 1 1 3 1 4 1 1 Real-Time 2 3 1 1 DC 1 3 2 2 4 4 5 3 6 4 Optimization 1 1 1 Security 1 3 2 3 Profiling 1 1 Testing 1 2 1 FT 2 1 5 7 2 2 2 3 ES Debugging 1 1 1 2 1 1 1 2 1 1 NLC AOP 1 1 2 1 2 1 8 9 0 1 2 3 4 5 6 7 8 9 0 9 9 0 0 0 0 0 0 0 0 0 0 1 9 9 0 0 0 0 0 0 0 0 0 0 0 1 1 2 2 2 2 2 2 2 2 2 2 2 19 / 24

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend