Q2. What is the number of snapshots with Mementos?
The number of snapshots with Mementos depends on the checkpoint placement, the value of Vmin and the supply interruption frequency; while for Hibernus++ it only depends on the supply interruption frequency.
Q3. What is the way to determine the optimal time for a snapshot?
if only one nonvolatile memory block is used for snapshot, a power loss during a snapshots is likely to result in the loss of all data up to that point.
Q4. What is the value of the voltage at the end of the hibernation process?
The drop in supply voltage due to hibernation (the process of storing the snapshot) is given by Vcal − Vmeas, where Vmeas is the voltage measured at the end of the hibernation process.
Q5. What is the new paradigm of c mputing?
A new paradigm, which addresses computing challenges with transient power sources such as energy harvesting, is of ‘transiently- owered c mputing’ [14].
Q6. What is the drawback of ch ckpoi ting?
a drawback of ch ckpoi ting is that it is impossible to predict the xact time of failures, so computation time will be wasted by (1) taking unnecessary checkpoints, and (2) rolling back to the last checkpoint if power failure occurs towards the end of a checkpoint interval.
Q7. Why did the power analyser capture the traces?
Due to limitations of the power analyser (which captures power traces and allows them to be replayed as a synthesized source), the authors could only collect 20 s of indoor PV behaviour during which lights are turned on and off twice.
Q8. What are the operating parameters of the system?
The operating parameters of the system are shown: hibernate and restore operations, the calibrate and classify operations, and the time for the FFT execution and the system in ON mode.
Q9. What is the performance of Mementos with higher Vm?
Mementos is more stable with higher Vm, but the performance decreases due to the large number of snapshots, as shown in Table I.
Q10. What is the concept of checkpointing used in large-scale computing?
This typically borrows from the concept of checkpointing, which has been used in large-scale computing for decad s to provide robustness against errors or hardware failure [15].