Mobile communication device application processing system

ABSTRACT

A system and method of pre-linking classes for use by one or more applications. The system and method may also be used where the runtime processing is split between a host system and a target system. At the host system at least several classes are loaded and linked. At least one host-linked module is generated from the linked classes. The host-linked module is made available for use by the one or more applications operating on the target system.

RELATED APPLICATION

[0001] This application claims priority to U.S. provisional application Serial No. 60/294,331 entitled “Method Of Splitting A Processing Machine Runtime Between A Host System And A Target System” filed May 30, 2001. By this reference, the full disclosure, including the drawings, of U.S. provisional application Serial No. 60/294,331 is incorporated herein.

BACKGROUND

[0002] This invention relates to the field of processing machine runtime environments. In particular, this invention relates to a method of splitting a processing machine runtime between a host system and a target system for conserving resources at the target system.

[0003] Currently, the state of the art virtual machine is the Java™ virtual machine (JVM) from Sun Microsystems, Inc. (Sun). At the centre of Sun Microsystems Java™ technology is their Java™ virtual machine code, or byte code, as currently specified by the class file format in chapter 4 of the second edition of The Java™ Virtual Machine Specification by Tim Lindholm and Frank Yellin, Addison-Wesley Pub Co; ISBN: 0201432943.

[0004] Class file byte code co-operates with Sun's Java™ Runtime Environment (JRE) on the Solaris™, Win32, Linux™, Mac, and possibly other platforms. Typically, source code written in the Java™ programming language, is compiled into virtual machine byte code respecting the class file format by using a Java™ compiler, such as “javac”, and then executed using the JRE or a compatible runtime environment and processing machine.

[0005] In reference to FIG. 1, a layered JRE architecture block diagram illustrates several aspects of the Sun technique. Various mechanisms (100A and 100B) provide program software (110A and 110B) byte code class files. For instance, a compiler 100A compiles software 110A into byte code class files. Alternatively, a web browser may use a software “plugin” 110B to download software 100B byte code class files.

[0006] Byte code in a class file usually references several other classes, each of which has a class file. For that reason, standard package 120 class files are provided as a shared software resource to be re-used by instances of software (110A and 110B). The JVM 140 obtains class files and executes software (110A and 110B) and standard package class files 120.

[0007] Also shown are the various systems 130 on top of which the JRE 142 operates. The standard packages in a runtime define a particular runtime platform specified in an application programmer's interface (API).

[0008] The Java™ 2 Standard Edition (J2SE) is a Sun reference platform API. They also provide a reference implementation comprising a JRE configured with a set of standard packages running on the JVM. Application developers can write applications in the Java™ programming language referring to the J2SE standard package classes and may expect to have their applications run on J2SE compliant runtime systems. Other platforms exist which are usually defined by comparison to the J2SE. For instance, a superset of J2SE, the Java™ 2 Enterprise Edition (J2EE) adds further features. Of particular interest is a subset of J2SE, the Java™ 2 Micro Edition (J2ME).

[0009] Although the J2SE platform may be well suited to operate on systems such as those illustrated by the Solaris™, Win32, Mac, Linux™, and other blocks 130 of FIG. 1, J2SE may not be well suited for operating on many devices. For instance, the class files of the standard J2SE packages may presently consume well over 16 Megabytes of disk space, which may exceed the storage capacity of many devices.

[0010] To address this problem, Sun introduced the Java™ 2 Micro Edition (J2ME) platform, additional virtual machines, and associated device configurations.

[0011] The Connected Limited Device Configuration (CLDC) and K Virtual Machine (KVM) address small consumer devices that you hold in your hand, with 128K to 512K of memory, and when used with the Mobile Information Device Profile (MIDP) may provide an application environment for devices such as cell phones and two-way pagers.

[0012] The Connected Device Configuration (CDC) and C Virtual Machine (CVM) address emerging, next-generation consumer devices with 2 MB or more of memory, and when used with the Foundation Profile (FP) may provide an application environment for next-generation consumer devices.

[0013] An advantage of J2ME is that when it is used with the aforementioned CLDC or CDC configurations, fewer standard class packages are stored on many devices as compared to J2SE. Therefore J2ME may take up less space on a device at the expense of not supporting all of the features of J2SE.

[0014] Although Java™ runtime technology may be available for different systems and devices, and although the J2ME platform addresses the limited storage space problem of devices by removing functionality, J2ME may not be considered an adequate solution since it may not address the efficiency of a device runtime implementation. Thus, there is a need for a runtime that is optimized for a target device (as well as other needs).

[0015] In order to better understand the present invention, the following information regarding Java runtime technology is provided. According to Lindholm et al., in section §2.17.1 of the Sun JVM spec: “The Java virtual machine starts execution by invoking the method main of some specified class and passing it a single argument, which is an array of strings. This causes the specified class to be loaded (§2.17.2), linked (§2.17.3) to other types that it uses, and initialized (§2.17.4)”. Therefore by specifying the name of a “main” class when starting the JVM 140 of FIG. 1, a class file will be loaded and execution of byte code instructions will begin at the static main entry point of that class file. Furthermore, referenced types, such as classes, used by the “main” class will be linked and initialized. Depending on the use of other classes by the “main” class file, significant runtime resources will be consumed in order to load and link used class files.

[0016] Java™ runtime technology requires that the runtime system load and link all required class files each time a “main” class is specified for execution, which may cause the precipitous consumption of resources on a target system such as a device.

[0017] A typical Java™ application has at least one “main” class file containing a static main entry point, as well as possibly having several supporting class files.

[0018] The following example Java™ program listing is considered next: public class Hello {   public static void main(String[] a) {     System.out.println(“Hello!”);     Bye.bye(a);   } } public class Bye {   public static void bye(String[] a) {     System.out.println(“Bye!”);   } }

[0019] The above listing provides source code for two classes, Hello and Bye, each of which can be compiled into class file format in a way which is known to a person skilled in the art, such as by placing the source for each class in a Hello.java file and a Bye.java file and using the command “javac Hello.java Bye.java” to obtain a Hello.class file and Bye.class file.

[0020] The Hello class provides a static main entry point and is therefore suitable to be specified as a “main” class when starting the JVM 140.

[0021] In reference to FIG. 2, the linking technique of the runtime of FIG. 1 is considered in reference to the above example “Hello” program. A plurality of class files 200 is available to the virtual machine 140 (of FIG. 1). Each class file has symbolic information that is used by the virtual machine 140 to resolve references to other used class files.

[0022] Typically, the Hello.class file 210A is loaded at 220A first as it is specified when starting the JVM 140. The JVM 140 then proceeds to execute byte code instructions at the main entry point of the loaded class 220A. Since the Hello class 220A uses several standard package classes, the class files for the used classes will be loaded and linked to the Hello class 220A. The Object.class file 210B will be loaded at 220B and linked 230B to the 210A Hello class. Similarly, the String.class file 210C, System.class file 210D, and other class files 210 used by the Hello class are loaded at 220C, 220D, 220 and linked at 230C, 230D, and 230. The Hello class also uses the Bye class (a supporting class which is not a standard package class) so the Bye.class file 210E will be loaded at 220E and linked at 230E.

[0023] Although not expressly shown in the drawings, each time a class file 210 is loaded at 220 and linked at 230, any class files the loaded class 220 uses might also be loaded and linked. For instance, in the case of the loaded supporting Bye class 220E, it uses many of the same classes as the Hello class 210A. Depending on when the Bye class 220E is loaded and linked 230E, the Bye class 220E may not have to load the class files 210 that are common with classes also used and loaded by the Hello class. However, all classes used by Bye 220A will ultimately have to be linked to Bye as well for Hello to be able to use the supporting Bye class. The situation is similar with standard package classes.

[0024] Traditional class file 210 loading (at 220) and linking (at 230) consume significant runtime resources and may slow down the execution of a “main” program 220A when loading and linking of class files is triggered by the specification of a command to execute a program, as will be discussed further next in reference to FIGS. 3A and 3B.

[0025] With reference to FIGS. 3A and 3B, a flowchart further illustrating the runtime linking technique of FIG. 2, particularly illustrating optional late resolution, is discussed. The “main” class is loaded at 310 from class storage 200, such as a hard drive or a network. The class is verified and prepared at 315. If late resolution is not used as determined at 320, then all used classes are linked and loaded at 325. Regardless of whether late resolution is used at 320 or not, the “main” class is initialized at 330.

[0026] Instructions from the main entry point are fetched at 335. If the fetched instruction does not involve an unresolved reference as determined at 340, the fetched instruction is. executed at 345. However if the fetched instruction involves an unresolved identifier reference as determined at 340, such as a class reference to a class that has not yet been loaded, then if late resolution is not used as determined at 350, an exception is thrown in the runtime. If late resolution is used as determined at 350, and if the referenced class cannot be loaded at 355, an exception is thrown in the runtime. However, if late resolution is used as determined at 350, and the referenced class can be loaded, the referenced class is loaded and the reference is resolved at 360 prior to executing the instruction at. 345. If there are more instructions to execute as determined at 365, then the next instruction is fetched at 335, or else the virtual machine ends.

[0027] If late resolution were used, then several class files would have been loaded and linked at 360 during execution of the main program byte code. Alternatively, if late resolution were not used, several class files would have been loaded and linked at 325 prior to executing the main program byte code, after specifying the “main” class file to the JVM 140. In either case, a precipitous consumption of resources for loading and linking may ensue between the time the main program was specified for execution by the JVM 140 in the runtime and the time when the main program either terminated or threw an exception.

[0028] Therefore, even by eliminating late resolution, there is a potential risk for a precipitous consumption of resources for loading and linking class files in execution triggered linking and loading.

SUMMARY

[0029] The present invention overcomes the problems noted above as well as others. In accordance with the teachings of the present invention, a system and method are provided for pre-linking classes for use by one or more applications. The system and method may also be used where the runtime processing is split between a host system and a target system. At the host system at least several classes are loaded and linked. At least one host-linked module is generated from the linked. classes. The host-linked module is made available for use by the one or more applications operating on the target system.

BRIEF DESCRIPTION OF THE DRAWINGS

[0030] In order that the invention may be more clearly understood, embodiments thereof will now be described in detail by way of example only, with reference to the accompanying drawings, in which:

[0031]FIG. 1 is a block diagram illustrating a prior art runtime technique;

[0032]FIG. 2 is a block diagram illustrating a linking technique of the runtime of FIG. 1;

[0033]FIGS. 3A and 3B are flowcharts further illustrating the runtime linking technique of FIG. 2, particularly illustrating optional late resolution;

[0034]FIGS. 4 and 5 are block diagrams illustrating an exemplary split runtime system;

[0035]FIGS. 6 and 7 are block diagrams illustrating different exemplary split runtime systems;

[0036]FIG. 8 is a block diagram illustrating a linking technique for a split runtime system;

[0037]FIG. 9 is a flowchart further illustrating the linking technique of FIG. 8, introducing a host-linking step and a target-linking step;

[0038]FIG. 10 is a flowchart further illustrating the host-linking step of FIG. 9; and

[0039]FIG. 11 is a flowchart further illustrating the target-linking step of FIG. 9.

[0040] The same reference numerals are used in different figures to refer to similar elements.

DETAILED DESCRIPTION

[0041]FIG. 4 depicts an embodiment of a module-based runtime system. Instead of unlinked class files, a processing machine 440 executes modules 450 that include classes that have already been loaded and linked. More specifically, the modules 450 comprise the information found in closed set loaded and linked class files, thereby optimizing commands, symbolic information, and code size and speed for the target processing machine 440. Modules 450 allow the runtime to re-use the intermediate loading and linking work in multiple executions of main programs, instead of repeating this work at every execution. Modules 450 provide an alternative to execution triggered loading and linking.

[0042] A compiler (or other mechanism) 405 receives a class file 407 which include symbolic references 409 to other classes 411. The compiler 405 processes class files 407 and 411 which are in byte code such that the symbolic references 409 are resolved. The processed class files are provided to the processing machine 440 as modules 450. The processing machine 440 operates more efficiently on target devices 430 since typically the module size is substantially smaller than traditional runtime class files, for example, there may be a reduction approximately eight-fold in comparison to Java class file size. Also, module code can be verified once using sanity checks prior to multiple executions, thereby increasing subsequent execution speeds. Modules can be configured to minimize code communication, particularly useful in communication bandwidth-limited devices. Modules 450 can be configured to minimize code set up and execution time, particularly useful in runtime resource-limited devices. Modules 450 can be adapted to existing processing machine runtimes while maintaining compatibility with reference APIs, as FIG. 5 illustrates.

[0043]FIG. 5 illustrates an embodiment wherein various mechanisms 405A and 405B provide software 410. A compiler 405A compiles software 410. Alternatively, other mechanisms 405B can be used to download or otherwise obtain software 410. Standard class packages 420 are provided as a shared software resource to be re-used by instances of software 410. The processing machine 440 obtains classes and executes software 410 using standard class packages 420.

[0044] Also shown are the various target devices 430 on top of which the processing machine 440 operates, such as a mobile device 430A, a personal data assistant (PDA) 430B, an appliance 430C, a thin client 430D, or other device 430E.

[0045] In FIG. 5, modules 450 have been introduced between the mechanism that provides software 410 and the processing machine 440 that executes machine code. The processing machine 440 however still uses the classes in the provided software 410 as well as the standard class packages 420, except that this is now done through the use of modules 450 rather than directly using class files. Class files can still be used as the compiler can take both class files and source files on its input and produce modules on its output.

[0046] Because of the presence of modules 450, the processing machine 440 need not be a virtual machine nor even know about the class file format, thereby optimizing performance at the target system by eliminating the need to load, link, and resolve class files. Further optimizations are possible if the provided runtime is split between a host system and a target device 430, as described in reference to FIG. 6.

[0047]FIG. 6 illustrates a split embodiment of a module-based runtime system. The class runtime processing is split between a host system 530 and a target system 430. The use of modules allow the runtime to be efficiently split between a host system and target device to optimize runtime efficiency at the target device.

[0048] In the host system split runtime, class files (407 and 411) are host-linked at 510 into host-linked modules 520. The work of closed class file set analysis is offloaded to the host system 530. In the target system split runtime, host-linked modules 520 are communicated at 540 from the host system 530, to be target-linked at 550 into target-linked modules 560. If any additional class resolution is needed on the target system 430, then the additionally needed target module identifiers 562 are target-linked at 550 with the host-linked modules 520 to form the target-linked modules 560. The processing machine 440 executes the target-linked modules 560.

[0049]FIG. 7 is a block diagram illustrating another split runtime system. For the host system 530, class files 410 are host-linked at 510 into host-linked modules 520. For this system, the details of host linking will be discussed further in reference to FIGS. 8, 9 and 10 below. For the target system 430, host-linked modules 520 are communicated at 540 from the host system 530, to be target-linked 550 into target-linked modules 560. The communication 540 between host and target may occur over any medium so that the module(s) may be provided to the target, such as through a mobile communications network if the target is a mobile communications device, or through a data signal embodied in a carrier signal. The details of target linking will be discussed further in reference to FIGS. 8, 9 and 11 below.

[0050] In reference to FIG. 8, a block diagram illustrating the loading of class files, and the split linking into modules, and execution of the split module runtime of FIGS. 6 and 7 is described presently. The work of closed class file set analysis is offloaded into a host system 400A. There, class files 600 are loaded at 610 and linked into host-linked modules 520A and 520F. Illustrated are an application module for the example “Hello” module 520A comprising the optimized information found in the Hello.class file 61 OA and Bye.class file 610E wherein the Hello class is pre-linked to the Bye class. Module 520A also has a symbolic reference 615 to a Library module 520F which comprises all of the standard package classes that the Hello and Bye classes use, such as the classes provided by the Object class file 610B, String class file 610C, System class file 610D, and other class files 610. The Library module 520F could export all public symbols so that many different “main” classes such as Hello can re-use all of the standard class package files. Altematively, the Library module could comprise only those class files used by the Hello and Bye classes, or even all used classes could be included directly in module 520A. The latter case would eliminate the need for any symbol resolution on the target system.

[0051] When at least one host-linked module (520A and/or 520F) is available, it is possible to communicate at 540 the candidate module 620A and 620F to the split runtime on the target system 400B. Once the candidate modules (620A and 602F) are received on the target system, it is target-linked into a target-linked module 560A and 560F and any module symbolic references 615 are resolved as shown at 630. A main module class can be specified for execution, such as the Hello class 640. However, advantageously, each time the main program of the Hello class executes, there is no need to resolve reference 650 as the target-linking 630 provides it.

[0052] With reference to FIG. 9, a flowchart further illustrating the linking technique of FIG. 8, depicting a host-linking step and a target-linking step, is described. In the split runtime system on the host, classes 600 are loaded and host-linked at 800 into host linked modules 520. Then, at least one host-linked module 520 is sent to the split runtime system on the target.

[0053] In the split runtime system on the target, at least one candidate host-linked module 620 is received at 720 from the host. The candidate host-linked module 620 is target-linked at 900 into a target-linked module 560. At least one target-linked module 560 is executed at 730. If a new module is desired as determined at 740, the host-linking process 800, communications processes (710 and 720) and target linking process 900 cycles may ensue. However, if no new modules are desired, then repeated execution at 730 of target-linked modules can ensue without the overhead of loading and linking.

[0054] In reference to FIG. 10, a flowchart further illustrating the host-linking step of FIG. 9 is described. In the split runtime system on the host, host linked modules 520 exported symbols provide at 810 foreign module identifiers 815. Also, classes 600 provide at 820 candidate host classes 825. Class references in the candidate host classes 825 are replaced at 830 with module references using foreign module identifiers 815, thereby providing closed set candidate module classes 835. Then, candidate module exported identifiers 845 are provided at 840. The candidate module classes 835 and exported identifiers 845 are then verified at 850. If verified as determined at 860, then the candidate host-linked module is provided at 870 as a host-linked module 520. If not verified as determined at 860, an exception is thrown.

[0055] In reference to FIG. 11, a flowchart further illustrating the target-linking step of FIG. 9 is described. In the split runtime system on the device, the received candidate module 620 provides at 910 candidate module references 915. Also, target-linked modules 560 provides at 920 target module identifiers 925. Next, resolution of module references in the candidate module provides at 930 a resolved module 935. The resolved module 935 is verified at 940, and if the resolved module 935 is verified successfully as determined at 950, then the resolved module 935 is stored at 960 with other target-linked modules 560. However, if the resolved module 935 is not verified successfully as determined by 950, an exception is thrown.

[0056] Having described in detail the preferred embodiments of the present invention, including preferred modes of operation, it is to be understood that this invention and operation could be constructed and carried out with different elements and steps. The embodiments are presented only by way of example and are not meant to limit the scope of the system and method of the present invention, which is defined by the claims.

[0057] To illustrate the wide scope of the system and method, the following is provided. Virtual machine code is usually interpreted by software. However, a virtual machine code processor can be implemented in hardware. Adaptation of the system and method to a hardware processing machine runtime is within the scope of the invention. As additional examples of the wide scope of the system and method, the system and method may allow for the optimization of commands, symbolic information, and code through the use of the system's and method's modules. The system and method may allow for a module size that is substantially smaller than traditional runtime class file, for instance by reducing in some cases by eight-fold the module size in comparison to Java class file size without losing functionality. The system and method may provide that module code can be verified using sanity checks once prior to multiple executions.

[0058] The system and method may also allow a module to combine only new classes to minimize module storage size and allow for efficient module delivery to communication bandwidth-limited devices. As another example of the wide scope of the system and method, the system and method can combine all required classes to minimize code set up and execution time in resource-limited devices. The system and method may be adapted to existing processing machine runtimes while maintaining compatibility with reference APIs. The system and method may provide that modules can be dynamically linked together while minimizing the number of symbolic references. Still further, the system and method may provide that code in modules can be executed directly from storage on a device, unlike class files that have to be loaded from storage prior to execution. 

It is claimed:
 1. A mobile communications device runtime system for executing an application, comprising: a pre-linked module that includes classes that have been loaded and linked, said pre-linked module having information of closed set loaded and linked class files; an application operative on the mobile communications device, wherein the application uses the classes during the application's execution, said application having access to the pre-linked module during execution of the application, whereby need for the application to repeat loading and linking of the classes is eliminated during the execution of the application due to the use of the pre-linked module.
 2. The system of claim 1 further comprising: a host system that generates the pre-linked module; a communication mechanism through which the pre-linked module is provided to a target system, wherein the application operates upon the target system.
 3. The system of claim 2 wherein the target system includes target-linking means for target-linking the pre-linked module with other modules for use by the application.
 4. The system of claim 1 wherein the pre-linked module substantially optimizes commands, symbolic information, and code.
 5. The system of claim 1 wherein the class files contain the classes and comprise symbolic information.
 6. The system of claim 1 wherein the pre-linked module is verified.
 7. The system of claim 1 wherein the pre-linked module comprises a plurality of modules that contain all classes needed by the application.
 8. The system of claim 1 wherein the pre-linked module comprises a plurality of modules, said modules being dynamically linked while substantially minimizing number of symbolic references.
 9. The system of claim 1 wherein the application is operative on a device, wherein the pre-linked module is directly executable from storage on the device.
 10. The system of claim 9 wherein the pre-linked module provides re-use of loading and linking steps in executions of multiple applications operating on the device.
 11. The system of claim 1 wherein the pre-linked module is generated prior to execution of the application.
 12. The system of claim 1 wherein the pre-linked module is configured based upon code set up and execution time.
 13. The system of claim 1 wherein the application operates upon a bandwidth-limited device.
 14. The system of claim 1 wherein the application operates upon a mobile data device.
 15. The system of claim 1 wherein the application operates upon a personal data assistant.
 16. The system of claim 1 wherein the application operates upon an appliance.
 17. The system of claim 1 wherein the application operates upon a thin client application.
 18. The system of claim 1 wherein the classes comprise Java-based classes.
 19. A method of host-linking classes at a host system for use by an application that operates on a target system, comprising: loading at the host system at least several classes; linking at the host system the loaded classes; and forming at least one host-linked module from the linked classes, wherein the host-linked module is made available for use by the application operating on the target system.
 20. The method of claim 19 wherein a services application provides at least one of the classes to be used in said loading step at the host system.
 21. The method of claim 19 wherein a software library provides at least one of the classes to be used in said loading step at the host system.
 22. The method of claim 19 wherein a Java application provides at least one of the classes to be used in said loading step at the host system.
 23. The method of claim 19 wherein the linking of the loaded classes at the host system substantially optimizes commands, symbolic information, and code.
 24. The method of claim 19 wherein the class files comprise symbolic information.
 25. The method of claim 19 further comprising the step of: verifying at the host system the host-linked module using sanity checks.
 26. The method of claim 19 further comprising the step of: verifying at the host system the host-linked module using sanity checks once prior to multiple executions of the host-linked module on the target system.
 27. The method of claim 19 wherein the host-linked module comprises a plurality of modules that contain all classes needed by the application.
 28. The method of claim 19 wherein the host-linked module comprises a plurality of modules, said modules being dynamically linked while substantially minimizing number of symbolic references.
 29. The method of claim 19 wherein the host-linked module is directly executable from storage on the target system.
 30. The method of claim 19 wherein the host-linked module comprises information of closed set loaded and linked class files.
 31. The method of claim 19 wherein the host-linked module provides re-use of the loading and the linking steps in multiple executions of the application.
 32. The method of claim 31 wherein the host system resolves module references during generation of the host-linked module.
 33. The method of claim 32 wherein the host-linked module being provided to the target system eliminates need for the target system to resolve classes associated with the host-linked module.
 34. The method of claim 19 wherein the host-linked module provides re-use of the loading and the linking steps in multiple executions of the application and of a second application.
 35. The method of claim 19 wherein the host-linked module is generated prior to execution of the application.
 36. The method of claim 19 wherein the host-linked module is configured based upon code communication to the target system.
 37. The method of claim 19 wherein the host-linked module is configured based upon code set up and execution time.
 38. The method of claim 19 further comprising the step of: providing the host-linked module to the target system for use by the application.
 39. The method of claim 19 further comprising the step of: transmitting the host-linked module from the host system to the target system over a mobile communication network for use by the application.
 40. The method of claim 19 further comprising the step of: dividing processing machine runtime between the host system and the target system by forming at the host system the host-linked module and by target-linking at the target system the host-linked module into at least one target-linked module for use by the application.
 41. The method of claim 19 further comprising the step of: target-linking at the target system the host-linked module with other modules for use by the application.
 42. The method of claim 41 further comprising the step of: providing a table of exported identifiers for use in the linking of the loaded classes at the host system.
 43. The method of claim 19 wherein the target system comprises a bandwidth-limited device.
 44. The method of claim 19 wherein the target system comprises a processing machine for executing the application.
 45. The method of claim 19 wherein the target system comprises a virtual machine for executing the application.
 46. The method of claim 19 wherein the target system comprises a mobile data device.
 47. The method of claim 19 wherein the target system comprises a personal data assistant.
 48. The method of claim 19 wherein the target system comprises an appliance.
 49. The method of claim 19 wherein the target system comprises a thin client application.
 50. The method of claim 19 wherein the target system comprises a virtual machine code processor to process the host-linked module.
 51. The method of claim 19 wherein the target system comprises a hardware processing machine runtime to process the host-linked module.
 52. The method of claim 19 wherein the classes comprise Java-based classes.
 53. Computer software stored on a computer readable media, the computer software comprising program code for carrying out a method according to claim
 19. 54. A host-linked module produced in accordance with the method of claim
 19. 55. A method of handling a host-linked module at a target system, said host-linked module having been generated by a host system through loading at least several classes, said host system linking at the host system the loaded classes and forming at least one host-linked module from the linked classes, said method comprising: receiving the host-linked module at the target system from the host system; determining whether any additional classes are to be linked with the host-linked module, if additional classes are to be linked, then linking the host-linked module with the additional classes to form a target-linked module; and allowing the target-linked module to be used by an application operating on the target system.
 56. The method of claim 55 wherein the host-linked module being provided to the target system eliminates the target system from resolving classes associated with the host-linked module.
 57. The method of claim 55 wherein the host-linked module being provided to the target system eliminates need for the target system to resolve classes associated with the host-linked module.
 58. The method of claim 55 wherein the target system comprises a bandwidth-limited device.
 59. The method of claim 55 wherein the target system comprises a processing machine for executing the application.
 60. The method of claim 55 wherein the target system comprises a virtual machine for executing the application.
 61. The method of claim 55 wherein the target system comprises a mobile data device.
 62. The method of claim 55 wherein the target system comprises a personal data assistant.
 63. The method of claim 55 wherein the target system comprises an appliance.
 64. The method of claim 55 wherein the target system comprises a thin client application.
 65. The method of claim 55 wherein the target system comprises a virtual machine code processor to process the host-linked module.
 66. The method of claim 55 wherein the target system comprises a hardware processing machine runtime to process the host-linked module.
 67. The method of claim 55 wherein the classes comprise Java-based classes.
 68. Computer software stored on a computer readable media, the computer software comprising program code for carrying out a method according to claim
 55. 69. The method of claim 55 wherein the host-linked module was verified at the host system using sanity checks once prior to multiple executions on the target system.
 70. The method of claim 55 wherein the host-linked module comprises a plurality of modules that contain all classes needed by the application.
 71. The method of claim 55 wherein the host-linked module comprises a plurality of modules, said modules having been dynamically linked while substantially minimizing number of symbolic references.
 72. The method of claim 55 wherein the host-linked module is directly executable from storage on the target system.
 73. The method of claim 55 wherein the host-linked module provides re-use of the loading and the linking steps in multiple executions of the application.
 74. The method of claim 73 wherein the host system resolves module references during generation of the host-linked module.
 75. The method of claim 55 wherein the host-linked module provides re-use of the loading and the linking steps in multiple executions of the application and of a second application.
 76. The method of claim 55 wherein the host-linked module is generated prior to execution of the application.
 77. The method of claim 55 wherein the host-linked module is configured based upon code communication to the target system.
 78. The method of claim 55 wherein the host-linked module is configured based upon code set up and execution time.
 79. The method of claim 55 further comprising the step of: receiving the host-linked module from the host system at the target system over a mobile communication network.
 80. The method of claim 55 further comprising the step of: dividing processing machine runtime between the host system and the target system by forming the host-linked module at the host system and by target-linking at the target system the host-linked module into at least one target-linked module for use by the application.
 81. A module-based runtime system for executing an application, comprising: a pre-linked module that includes classes that have been loaded and linked, said pre-linked module having information of closed set loaded and linked class files; an application that uses the classes during the application's execution, said application having access to the pre-linked module for use during execution of the application, whereby need for the application to repeat loading and linking of the classes is eliminated during the execution of the application due to the use of the pre-linked module.
 82. A host-linked module for use by an application that operates on a target system, said host-linked module being generated through a process comprising the steps of: loading at the host system at least several classes; linking at the host system the loaded classes; and forming at least one host-linked module from the linked classes, wherein the host-linked module is made available for use by the application operating on the target system.
 83. A computer data signal embodied in a carrier wave comprising a host-linked module, said host-linked module comprising classes that have been loaded and linked, said host-linked module having information of closed set loaded and linked class files, said host-linked module for use by an application that uses the classes during the application's execution, said application having access to the host-linked module during execution of the application, whereby need for the application to repeat loading and linking of the classes is eliminated during the execution of the application due to the use of the host-linked module. 