Abstract is missing.
- Reconsidering custom memory allocationEmery D. Berger, Benjamin G. Zorn, Kathryn S. McKinley. 1-12 [doi]
- Creating and preserving locality of java applications at allocation and garbage collection timesYefim Shuf, Manish Gupta, Hubertus Franke, Andrew W. Appel, Jaswinder Pal Singh. 13-25 [doi]
- BuddyCache: high-performance object storage for collaborative strong-consistency applications in a WANMagnus E. Bjornsson, Liuba Shrira. 26-39 [doi]
- Workflow enactment with continuation and future objectsDragos-Anton Manolescu. 40-51 [doi]
- Integrating independent components with on-demand remodularizationMira Mezini, Klaus Ostermann. 52-67 [doi]
- Portable serialization of CORBA objects: a reflective approachMarc-Olivier Killijian, Juan-Carlos Ruiz-Garcia, Jean-Charles Fabre. 68-82 [doi]
- Multiple instances and symbolic variables in executable sequence chartsRami Marelly, David Harel, Hillel Kugler. 83-100 [doi]
- A constraint-based architecture for local searchLaurent Michel, Pascal Van Hentenryck. 83-100 [doi]
- Online feedback-directed optimization of JavaMatthew Arnold, Michael Hind, Barbara G. Ryder. 111-129 [doi]
- Lock reservation: Java locks can mostly do without atomic operationsKiyokuni Kawachiya, Akira Koseki, Tamiya Onodera. 130-141 [doi]
- Fast algorithm for creating space efficient dispatching tables with application to multi-dispatchingYoav Zibin, Joseph Gil. 142-160 [doi]
- Design pattern implementation in Java and aspectJJan Hannemann, Gregor Kiczales. 161-173 [doi]
- Implementing distribution and persistence aspects with aspectJSérgio Soares, Eduardo Laureano, Paulo Borba. 174-190 [doi]
- Write barrier removal by static analysisKaren Zee, Martin C. Rinard. 191-210 [doi]
- Ownership types for safe programming: preventing data races and deadlocksChandrasekhar Boyapati, Robert Lee, Martin C. Rinard. 211-230 [doi]
- An analyzable annotation languageSarfraz Khurshid, Darko Marinov, Daniel Jackson. 231-245 [doi]
- Performance and scalability of EJB applicationsEmmanuel Cecchet, Julie Marguerite, Willy Zwaenepoel. 246-261 [doi]
- Incommunicado: efficient communication for isolatesKrzysztof Palacz, Jan Vitek, Grzegorz Czajkowski, Laurent Daynès. 262-274 [doi]
- Sifting out the mud: low level C++ code reuseBjorn De Sutter, Bruno De Bus, Koenraad De Bosschere. 275-291 [doi]
- Ownership, encapsulation and the disjointness of type and effectDavid G. Clarke, Sophia Drossopoulou. 292-310 [doi]
- Alias annotations for program understandingJonathan Aldrich, Valentin Kostadinov, Craig Chambers. 311-330 [doi]
- GCspy: an adaptable heap visualisation frameworkTony Printezis, Richard E. Jones. 343-358 [doi]
- Access rights analysis for JavaLarry Koved, Marco Pistoia, Aaron Kershenbaum. 359-372 [doi]
- Language-specific make technology for the Java programming languageMikhail Dmitriev. 373-385 [doi]