{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:13:40Z","timestamp":1766441620174,"version":"3.41.0"},"reference-count":31,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2017,9,11]],"date-time":"2017-09-11T00:00:00Z","timestamp":1505088000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGOPS Oper. Syst. Rev."],"published-print":{"date-parts":[[2017,9,11]]},"abstract":"<jats:p>The current pace of innovation in computing makes it difficult to assume a fixed set of requirements for the whole life span of a system. Aggressive technology scaling also imposes additional constraints to modern hardware platforms. An answer to this question are self-aware systems, which are capable of autonomously sensing and actuating upon themselves to cope with varying requirements. In this paper, we discuss the design and implementation of adaptive components in this scenario from the perspective of the OS. Components can exist in multiple avors that can by dynamically chosen according to current demands. The proposed framework supports this variability for components while preserving their interface contracts, even if avors exist in different domains (software, hardware, remote). The synthesis process delivers tailored wrapper for components according to their avors. Besides reconfiguration, we also support adaptations through dynamic power management and task remapping. The framework also supports component designers in terms of sensing via an event-based mechanism. The framework is validated through a case with three adaptive components in a telecommunication switch (AES, ADPCM, and DTMF) with little overhead both in terms of execution time and memory\/silicon consumption.<\/jats:p>","DOI":"10.1145\/3139645.3139663","type":"journal-article","created":{"date-parts":[[2017,9,12]],"date-time":"2017-09-12T18:56:39Z","timestamp":1505242599000},"page":"101-112","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["OS Support for Adaptive Components in Self-aware Systems"],"prefix":"10.1145","volume":"51","author":[{"given":"Jo\u00e3o Gabriel","family":"Reis","sequence":"first","affiliation":[{"name":"Federal University of Santa Catarina, Florian\u00f3polis, Brazil"}]},{"given":"Ant\u00f4nio Augusto","family":"Fr\u00f6hlich","sequence":"additional","affiliation":[{"name":"Federal University of Santa Catarina, Florian\u00f3polis, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2017,9,11]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2010.55"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1543135.1542481"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1809028.1806620"},{"issue":"11","key":"e_1_2_1_4_1","first-page":"1","article-title":"Evaluation of silicon consumption for a connectionless network-on-chip","volume":"3","author":"Berejuck M. D.","year":"2014","unstructured":"M. D. Berejuck and A. A. Fr\u00f6hlich . Evaluation of silicon consumption for a connectionless network-on-chip . International Journal of Advanced Studies in Computer Science and Engineering , 3 ( 11 ): 1 -- 11 , 2014 . M. D. Berejuck and A. A. Fr\u00f6hlich. Evaluation of silicon consumption for a connectionless network-on-chip. International Journal of Advanced Studies in Computer Science and Engineering, 3(11):1--11, 2014.","journal-title":"International Journal of Advanced Studies in Computer Science and Engineering"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10617-013-9116-3"},{"key":"e_1_2_1_6_1","volume-title":"Generative Programming: Methods, Tools, and Applications","author":"Czarnecki K.","year":"2000","unstructured":"K. Czarnecki and U. W. Eisenecker . Generative Programming: Methods, Tools, and Applications . ACM Press\/Addison-Wesley Publishing Co. , 2000 . K. Czarnecki and U. W. Eisenecker. Generative Programming: Methods, Tools, and Applications. ACM Press\/Addison-Wesley Publishing Co., 2000."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837352"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2968456.2968459"},{"key":"e_1_2_1_10_1","first-page":"415","volume-title":"Proc. USENIX Symposium on Operating Systems Design and Implementation","author":"Fonseca P.","year":"2014","unstructured":"P. Fonseca , R. Rodrigues , and B. B. Brandenburg . SKI: Exposing kernel concurrency bugs through systematic schedule exploration . In Proc. USENIX Symposium on Operating Systems Design and Implementation , pages 415 -- 431 , 2014 . P. Fonseca, R. Rodrigues, and B. B. Brandenburg. SKI: Exposing kernel concurrency bugs through systematic schedule exploration. In Proc. USENIX Symposium on Operating Systems Design and Implementation, pages 415--431, 2014."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2883591.2883594"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11241-013-9183-3"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-39362-9_28"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961296.1950390"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1322263.1322277"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2247038"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1596532.1596540"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/RSP.2015.7416551"},{"key":"e_1_2_1_19_1","first-page":"161","volume-title":"Proc. IEEE Computer Society Annual Symposium on VLSI","author":"Martins V. M. G.","year":"2015","unstructured":"V. M. G. Martins , P. R. C. Villa , H. C. C. Neto , and E. A. Bezerra . A TMR strategy with enhanced dependability features based on a partial reconfiguration ow . In Proc. IEEE Computer Society Annual Symposium on VLSI , pages 161 -- 166 , July 2015 . V. M. G. Martins, P. R. C. Villa, H. C. C. Neto, and E. A. Bezerra. A TMR strategy with enhanced dependability features based on a partial reconfiguration ow. In Proc. IEEE Computer Society Annual Symposium on VLSI, pages 161--166, July 2015."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.159"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70592-5_20"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2011.2167360"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744915"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2015.22"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/RSP.2015.7416542"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/RSP.2014.6966902"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/2755753.2755895"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1322263.1322279"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2002.1028477"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228567"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/568014.379583"},{"key":"e_1_2_1_32_1","volume-title":"Proc. Workshop on Power-Aware Computing and Systems. USENIX","author":"Wanner L.","year":"2014","unstructured":"L. Wanner and M. Srivastava . ViRUS: Virtual function replacement under stress . In Proc. Workshop on Power-Aware Computing and Systems. USENIX , 2014 . L. Wanner and M. Srivastava. ViRUS: Virtual function replacement under stress. In Proc. Workshop on Power-Aware Computing and Systems. USENIX, 2014."}],"container-title":["ACM SIGOPS Operating Systems Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3139645.3139663","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3139645.3139663","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:39Z","timestamp":1750217439000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3139645.3139663"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,11]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,9,11]]}},"alternative-id":["10.1145\/3139645.3139663"],"URL":"https:\/\/doi.org\/10.1145\/3139645.3139663","relation":{},"ISSN":["0163-5980"],"issn-type":[{"type":"print","value":"0163-5980"}],"subject":[],"published":{"date-parts":[[2017,9,11]]},"assertion":[{"value":"2017-09-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}