Proceedings of the 16th ACM/IEEE International Conference on Information Processing in Sensor Networks 2017
DOI: 10.1145/3055031.3055082
|View full text |Cite
|
Sign up to set email alerts
|

HarvOS

Abstract: We present code instrumentation strategies to allow transiently-powered embedded sensing devices efficiently checkpoint the system's state before energy is exhausted. Our solution, called HarvOS, operates at compile-time with limited developer intervention based on the control-flow graph of a program, while adapting to varying levels of remaining energy and possible program executions at run-time. In addition, the underlying design rationale allows the system to spare the energy-intensive probing of the energy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 78 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…We conduct an early assessment of the techniques that also evaluate the effects of intermittence bugs. We select a set of common benchmarks in intermittent computing [1][2][3]21]: CRC computation, FFT for signal analysis, and AES for encryption. The benchmarks are taken from MiBench2 [18], that is, MiBench [8] ported to IoT devices [25].…”
Section: Early Resultsmentioning
confidence: 99%
“…We conduct an early assessment of the techniques that also evaluate the effects of intermittence bugs. We select a set of common benchmarks in intermittent computing [1][2][3]21]: CRC computation, FFT for signal analysis, and AES for encryption. The benchmarks are taken from MiBench2 [18], that is, MiBench [8] ported to IoT devices [25].…”
Section: Early Resultsmentioning
confidence: 99%
“…Reliable and efficient state retention through power cycles is the main priority in IC. Conflicting design goals such as having minimal hardware dependency [7,16,20], minimizing the number of snapshots written during a power cycle [3,4,7], reducing the size of snapshots [6,7,11,14] and maintaining compatibility with existing codebases [3,4] has driven research into fundamentally diverging approaches. In order to determine the most suitable approach for high-performance systems, we introduce a taxonomy based on the following three classes of IC strategies.…”
Section: Taxonomy Of Existing Ic Strategiesmentioning
confidence: 99%
“…The circles show the latest snapshot before power is lost; any computation after the latest snapshot is a waste of resources. Note that some task-based or static approaches may avoid wasted computation after a checkpoint by measuring stored energy and comparing it to predictions [7] or observations [12] of the energy required to reach the next task-boundary or checkpoint.…”
Section: Taxonomy Of Existing Ic Strategiesmentioning
confidence: 99%
See 2 more Smart Citations