Initialize once, start fast: application initialization at build time

C Wimmer, C Stancu, P Hofer, V Jovanovic… - Proceedings of the …, 2019 - dl.acm.org
Arbitrary program extension at run time in language-based VMs, eg, Java's dynamic class
loading, comes at a startup cost: high memory footprint and slow warmup. Cloud computing …

Efficient memory safety for TinyOS

N Cooprider, W Archer, E Eide, D Gay… - Proceedings of the 5th …, 2007 - dl.acm.org
Reliable sensor network software is difficult to create: applications are concurrent and
distributed, hardware-based memory protection is unavailable, and severe resource …

A compiler and runtime for heterogeneous computing

J Auerbach, DF Bacon, I Burcea, P Cheng… - Proceedings of the 49th …, 2012 - dl.acm.org
Heterogeneous systems show a lot of promise for extracting high-performance by combining
the benefits of conventional architectures with specialized accelerators in the form of …

Harbor: software-based memory protection for sensor nodes

R Kumar, E Kohler, M Srivastava - … of the 6th international conference on …, 2007 - dl.acm.org
Many sensor nodes contain resource constrained microcontrollers where user level
applications, operating system components, and device drivers share a single address …

Safe system-level concurrency on resource-constrained nodes

F Sant'Anna, N Rodriguez, R Ierusalimschy… - Proceedings of the 11th …, 2013 - dl.acm.org
Despite the continuous research to facilitate WSNs development, most safety analysis and
mitigation efforts in concurrency are still left to developers, who must manage …

Interface contracts for tinyos

W Archer, P Levis, J Regehr - … of the 6th international conference on …, 2007 - dl.acm.org
TinyOS applications are built with software components that communicate through narrow
interfaces. Since components enable fine-grained code reuse, this approach has been …

A system for coarse grained memory protection in tiny embedded processors

R Kumar, A Singhania, A Castner, E Kohler… - Proceedings of the 44th …, 2007 - dl.acm.org
Many embedded systems contain resource constrained microcontrollers where applications,
operating system components and device drivers reside within a single address space with …

Performance of wireless sensor topologies inspired by E. coli genetic networks

BK Kamapantula, A Abdelzaher… - 2012 IEEE …, 2012 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) form a critical component in modern computing
applications; given their size, ability to process and communicate information, and to sense …

CapeVM: A safe and fast virtual machine for resource-constrained Internet-of-Things devices

N Reijers, CS Shih - Proceedings of the 16th ACM Conference on …, 2018 - dl.acm.org
This paper presents CapeVM, a sensor node virtual machine aimed at delivering both high
performance and a sandboxed execution environment that ensures malicious code cannot …

Software verification for TinyOS

D Bucur, MZ Kwiatkowska - Proceedings of the 9th ACM/IEEE …, 2010 - dl.acm.org
We describe the first software tool for the verification of TinyOS 2, MSP430 applications at
compile-time. Given assertions upon the state of the sensor node, the tool boundedly …