2013
DOI: 10.1109/tc.2012.161
|View full text |Cite
|
Sign up to set email alerts
|

R2: Incremental Reprogramming Using Relocatable Code in Networked Embedded Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 33 publications
(26 citation statements)
references
References 29 publications
(55 reference statements)
0
26
0
Order By: Relevance
“…Hu et al [4] propose the same block-matching algorithm RTMD to reuse the code blocks in the old image as much as possible. The R2 [12] combines the merits both of Zephyr and RTMD. Relative to Zephyr, R2 leverages the relocatable position-independent code to keep the references of functions and variables not being changed between different version.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Hu et al [4] propose the same block-matching algorithm RTMD to reuse the code blocks in the old image as much as possible. The R2 [12] combines the merits both of Zephyr and RTMD. Relative to Zephyr, R2 leverages the relocatable position-independent code to keep the references of functions and variables not being changed between different version.…”
Section: Related Workmentioning
confidence: 99%
“…These updating cases will be detailed in Section 6.1. Figure 1(b) shows the ratio of the size of the updating script to the size of the new image in Step 3 which is written into the program flash using a traditional reprogramming [12]. On average, more than 1265 bytes are transmitted in the five cases.…”
Section: Inmentioning
confidence: 99%
See 1 more Smart Citation
“…WENS have been widely deployed recently to support Internet-of-things [3,4,5,6]. Bulk data dissemination is used to distribute a large data object reliably from a sink node to all network nodes in WENS, becoming an essential building module for a variety of WENS systems, e.g., remote software management [7], security patches [8], reprogramming [9,10] and video distribution [11].…”
Section: Introductionmentioning
confidence: 99%
“…The performance of systematic, modular and virtual machine based reprogramming is poor because those approaches need to transmit large size patch and demand high processing time and capabilities to be provided by the node's CPU, it is intolerable for the energy-limited nodes. Differential approaches [3][4][5] generate a patch by comparing the new code with the old version at the base-station. The salient feature of this approach is that the base-station only transmits the differential patch.…”
Section: Introductionmentioning
confidence: 99%