2017
DOI: 10.1145/3093315.3037711
|View full text |Cite
|
Sign up to set email alerts
|

Determining Application-specific Peak Power and Energy Requirements for Ultra-low Power Processors

Abstract: Many emerging applications such as IoT, wearables, implantables, and sensor networks are power-and energyconstrained. These applications rely on ultra-low-power processors that have rapidly become the most abundant type of processor manufactured today. In the ultra-low-power embedded systems used by these applications, peak power and energy requirements are the primary factors that determine critical system characteristics, such as size, weight, cost, and lifetime. While the power and energy requirements of th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 31 publications
0
3
0
Order By: Relevance
“…SRA approaches combined with worst case energy models can lead to significant overestimation [10]. Symbolic simulation at the RTL could retrieve tighter bounds, [12], but such approaches require sensitive architectural information, typically not available for commercial processors. To retrieve tight energy bounds at the ISA level, data-sensitive energy models and static analysis would be required.…”
Section: Outstanding Challengesmentioning
confidence: 99%
“…SRA approaches combined with worst case energy models can lead to significant overestimation [10]. Symbolic simulation at the RTL could retrieve tighter bounds, [12], but such approaches require sensitive architectural information, typically not available for commercial processors. To retrieve tight energy bounds at the ISA level, data-sensitive energy models and static analysis would be required.…”
Section: Outstanding Challengesmentioning
confidence: 99%
“…OS-level power management that keeps unused resources in sleep states [22] is complimentary to Capybara. Methods for estimating worst-case energy consumption of software tasks [8,21] apply for provisioning capacity for Capybara banks given an application.…”
Section: Related Workmentioning
confidence: 99%
“…Notice that this fact -acquisition of physical power-is not a contribution per se, as different research groups have done it consistently. Yet, in the absence of fine-grained synchronization, researchers much either focus on peak consumption [17], on large programming events [18], or resort to power models based on hardware performance counters.…”
Section: Related Workmentioning
confidence: 99%