2022
DOI: 10.1016/j.sysarc.2022.102464
|View full text |Cite
|
Sign up to set email alerts
|

A survey and experimental analysis of checkpointing techniques for energy harvesting devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 55 publications
0
6
0
Order By: Relevance
“…Checkpointing: The checkpoint technique of failure handling was used in the experiment to handle the transient failure of an application during runtime as a baseline approach 29,30 …”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…Checkpointing: The checkpoint technique of failure handling was used in the experiment to handle the transient failure of an application during runtime as a baseline approach 29,30 …”
Section: Methodsmentioning
confidence: 99%
“…The study introduces the fully polynomial approximate time scheme (FPTAS) to solve the knapsack task assignment problem. It accepts input as an exponential size and ensures a failure or success process 29 . It is essential to make the solution based on the decision knapsack problem under the polynomial time when the exponential log's input size is measured.…”
Section: Proposed Schemesmentioning
confidence: 99%
See 2 more Smart Citations
“…When program execution reaches a checkpoint, the system states will be copied from the volatile main memory to the NVM, where the program can be resumed. This technique was widely used in intermittent computing [3]- [13], [60]. The checkpointing technique is program-friendly since it typically does not require the programmer to specify the specific checkpointed data.…”
Section: B Intermittent Computingmentioning
confidence: 99%