[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/327164.327219acmconferencesArticle/Chapter ViewAbstractPublication PagescscConference Proceedingsconference-collections
Article
Free access

Memory organization and management for linked data structures

Published: 01 April 1991 Publication History
First page of PDF

References

[1]
Andre, D. L., Paging in Lisp Programs, The Faculty of Graduate School of The University of Maryland (1986).
[2]
Bishop P. B., Computer Systems with a Very Large Address Space and Garbage Collection, MIT/LCS/TR-178, Laboratory for Computer Science, MIT (1977).
[3]
Bobrow, D., et al., Common Lisp Object System Specification, X3J13 Documents 88-002R (1988).
[4]
Chikayama, T. and Kimura, Y., Multiple Reference Management in Flat GHC, Proc. of ICLP '87 (1987), 276-293.
[5]
Cohen, J., Garbage Collection of Linked Data Structures, Computing Surveys 13, 3 (1981), 341-367.
[6]
Courts, R., Improving Locality of Reference in a Garbage-Collecting Memory Management System, Comm. of the ACM 31, 9 (1988), 1128-1138.
[7]
Denning, P. J., Virtual Memory, Computing Surveys 2, 3 (1970), 153-189.
[8]
Deutch, L. P. and Bobrow, D. G., An Efficient Incremental Automatic Garbage Collector, Comm. of the ACM 19, 9 (1976), 522-526.
[9]
Gabriel, R. P., Performance and Evaluation of Lisp Systems, MIT Press (1985).
[10]
Lieberman, H. and Hewitt, C., A Real-Time Garbage Collection Based on the Lifetimes of Objects, Comm. of the ACM 26, 6 (1983), 419-429.
[11]
Maegawa, H., et al., The Virtual Storage Management Method for Pointer-Linked Data, IPSJ SIG Reports SYM50-1 (1989).
[12]
Maegawa, H., et al., Memory Management for Lined Data Structures, Proc. of the 39th Annual Convention IPS Japan, 1Q-4 (1989), 1279-1280.
[13]
Maegawa, H., et al., A Structure Oriented Storage Organization for Linked Data, IPSJ SiG Reports ARC80-5 (1990), 33-39.
[14]
Maegawa, H., et al., An Architecture based on Computational Resources and Evaluation, Proc. of the 40th Annual Convention IPS Japan, 5L-1 (1990), 1225-1226.
[15]
Moon, D. A., Garbage Collection in a Large Lisp System, Conference Record of the 1984 ACM Symposium on Lisp and Functional Programming (1984), 235-246.
[16]
Stamos, J. W., Static Grouping of Small Objects to Enhance Performance of a Paged Virtual Memory, ACM Trans. Computer Systems 2, 2 (1984), 155-180.
[17]
Saneto, T. and Maegawa, H., The Memory Organization for Linked Data Structures and Its Dynamic Characteristics, IPSJ SIG Reports ARC85-10 (1990), 71-78.
[18]
Steele, G. L. Jr., Common Lisp: The Language, Digital Press (1984).
[19]
Ungar, D., Generation Scavenging: A Nondisruptive High Performance Storage Reclamation Algorithm, Proc. of Software Engineering Symposium on Practical Software Development Environments (1984), 157-167.
[20]
Yasuda, H., et al., Lilac: Parallel Distributed System based on Computational Resources, IPSJ SIG Reports SYM55-2 (1990).
[21]
Yasuda, H., et al., The Organization of Parallel Distributed System Lilac, Proc. of the 41st Annual Convention iPS Japan 6, 5P-4 (1990), 147-148,

Cited By

View all
  • (2008)A Randomized Approach to Bound Jayanti's Mutual Exclusion AlgorithmProceedings of the 2008 First International Conference on Emerging Trends in Engineering and Technology10.1109/ICETET.2008.20(1325-1330)Online publication date: 16-Jul-2008
  1. Memory organization and management for linked data structures

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CSC '91: Proceedings of the 19th annual conference on Computer Science
    April 1991
    711 pages
    ISBN:0897913825
    DOI:10.1145/327164
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 April 1991

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)65
    • Downloads (Last 6 weeks)6
    Reflects downloads up to 01 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2008)A Randomized Approach to Bound Jayanti's Mutual Exclusion AlgorithmProceedings of the 2008 First International Conference on Emerging Trends in Engineering and Technology10.1109/ICETET.2008.20(1325-1330)Online publication date: 16-Jul-2008

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media