{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:49:55Z","timestamp":1764784195554,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,2,22]],"date-time":"2019-02-22T00:00:00Z","timestamp":1550793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["HR001117C0051"],"award-info":[{"award-number":["HR001117C0051"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1518865"],"award-info":[{"award-number":["CNS-1518865"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,2,22]]},"DOI":"10.1145\/3301293.3302357","type":"proceedings-article","created":{"date-parts":[[2019,2,22]],"date-time":"2019-02-22T22:12:13Z","timestamp":1550873533000},"page":"45-50","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["The Computing Landscape of the 21st Century"],"prefix":"10.1145","author":[{"given":"Mahadev","family":"Satyanarayanan","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Wei","family":"Gao","sequence":"additional","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, PA, USA"}]},{"given":"Brandon","family":"Lucia","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,2,22]]},"reference":[{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872397"},{"key":"e_1_3_2_1_4_1","volume-title":"Programming languages and compiler design for realistic quantum hardware. Nature 549 (September","author":"Chong Frederic T.","year":"2017","unstructured":"Frederic T. Chong , Diana Franklin , and Margaret Martonosi . 2017. Programming languages and compiler design for realistic quantum hardware. Nature 549 (September 2017 ), 180--187. Frederic T. Chong, Diana Franklin, and Margaret Martonosi. 2017. Programming languages and compiler design for realistic quantum hardware. Nature 549 (September 2017), 180--187."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173210"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2481183"},{"key":"e_1_3_2_1_7_1","first-page":"3","article-title":"Micro-Scale Mobile Robotics","volume":"2","author":"Diller Eric","year":"2013","unstructured":"Eric Diller and Metin Sitti . 2013 . Micro-Scale Mobile Robotics . Found. Trends Robot 2 , 3 (Sept. 2013), 143--259. Eric Diller and Metin Sitti. 2013. Micro-Scale Mobile Robotics. Found. Trends Robot 2, 3 (Sept. 2013), 143--259.","journal-title":"Found. Trends Robot"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-02481-8","volume-title":"Cyber Foraging: Bridging Mobile and Cloud Computing via Opportunistic Offload","author":"Flinn Jason","year":"2012","unstructured":"Jason Flinn . 2012 . Cyber Foraging: Bridging Mobile and Cloud Computing via Opportunistic Offload . Morgan & Claypool Publishers . Jason Flinn. 2012. Cyber Foraging: Bridging Mobile and Cloud Computing via Opportunistic Offload. Morgan & Claypool Publishers."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132211.3134453"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/35037.35059"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2016.56"},{"volume-title":"Proceedings of the IEEE Int'l Conference on Robotics and Automation","author":"James Johannes","key":"e_1_3_2_1_12_1","unstructured":"Johannes James , Vikram Iyer , Yogesh Chukewad , Shyamnath Gollakota , and Sawyer B. Fuller . 2018. Liftoff of a 190 mg Laser-Powered Aerial Vehicle: The Lightest Wireless Robot to Fly . In Proceedings of the IEEE Int'l Conference on Robotics and Automation . Brisbane, Australia. Johannes James, Vikram Iyer, Yogesh Chukewad, Shyamnath Gollakota, and Sawyer B. Fuller. 2018. Liftoff of a 190 mg Laser-Powered Aerial Vehicle: The Lightest Wireless Robot to Fly. In Proceedings of the IEEE Int'l Conference on Robotics and Automation. Brisbane, Australia."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1021\/acs.nanolett.7b01112"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of Int'l conference on Power aware computing and systems.","author":"Sueur Etienne Le","year":"2010","unstructured":"Etienne Le Sueur and Gernot Heiser . 2010 . Dynamic voltage and frequency scaling: The laws of diminishing returns . In Proceedings of Int'l conference on Power aware computing and systems. Etienne Le Sueur and Gernot Heiser. 2010. Dynamic voltage and frequency scaling: The laws of diminishing returns. In Proceedings of Int'l conference on Power aware computing and systems."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486015"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081351"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 2nd Summit on Advances in Programming Languages.","author":"Lucia Brandon","year":"2017","unstructured":"Brandon Lucia , Vignesh Balaji , Alexei Colin , Kiwan Maeng , and Emily Ruppel . 2017 . Intermittent Computing: Challenges and Opportunities . In Proceedings of the 2nd Summit on Advances in Programming Languages. Brandon Lucia, Vignesh Balaji, Alexei Colin, Kiwan Maeng, and Emily Ruppel. 2017. Intermittent Computing: Challenges and Opportunities. In Proceedings of the 2nd Summit on Advances in Programming Languages."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737978"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230566"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898019"},{"key":"e_1_3_2_1_21_1","volume-title":"Adaptive Dynamic Checkpointing for Safe Efficient Intermittent Computing. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18)","author":"Maeng Kiwan","year":"2018","unstructured":"Kiwan Maeng and Brandon Lucia . 2018 . Adaptive Dynamic Checkpointing for Safe Efficient Intermittent Computing. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18) . Kiwan Maeng and Brandon Lucia. 2018. Adaptive Dynamic Checkpointing for Safe Efficient Intermittent Computing. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2809695.2809728"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2636342"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/5666.5671"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266708"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2007.897768"},{"key":"e_1_3_2_1_27_1","volume-title":"That Statistics Portal","author":"Statista","year":"2016","unstructured":"Statista : That Statistics Portal . 2016 . Projected size of the global market for RFID tags from 2016 to 2020. https:\/\/www.statista.com\/statistics\/299966\/size-of-the-global-rfid-market\/. (2016). Statista: That Statistics Portal. 2016. Projected size of the global market for RFID tags from 2016 to 2020. https:\/\/www.statista.com\/statistics\/299966\/size-of-the-global-rfid-market\/. (2016)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.53351"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/248052.248053"},{"key":"e_1_3_2_1_30_1","volume-title":"Pervasive Computing: Vision and Challenges","author":"Satyanarayanan Mahadev","year":"2001","unstructured":"Mahadev Satyanarayanan . 2001 . Pervasive Computing: Vision and Challenges . IEEE Personal Communications 8, 4 (2001). Mahadev Satyanarayanan. 2001. Pervasive Computing: Vision and Challenges. IEEE Personal Communications 8, 4 (2001)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/507052.507053"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2721914.2721921"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.9"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2009.82"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/323647.323633"},{"volume-title":"The Periodic Table: Its Story and Its Significance","author":"Scerri Eric R.","key":"e_1_3_2_1_36_1","unstructured":"Eric R. Scerri . 2007. The Periodic Table: Its Story and Its Significance . Oxford University Press . Eric R. Scerri. 2007. The Periodic Table: Its Story and Its Significance. Oxford University Press."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2016.12"},{"volume-title":"Application Design for Wearable Computing","author":"Siewiorek Dan","key":"e_1_3_2_1_38_1","unstructured":"Dan Siewiorek , Asim Smailagic , and Thad Starner . 2008. Application Design for Wearable Computing . Morgan & Claypool Publishers . Dan Siewiorek, Asim Smailagic, and Thad Starner. 2008. Application Design for Wearable Computing. Morgan & Claypool Publishers."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/2665671.2665707"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/0140-3664(91)90058-9"}],"event":{"name":"HotMobile '19: The 20th International Workshop on Mobile Computing Systems and Applications","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Santa Cruz CA USA","acronym":"HotMobile '19"},"container-title":["Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301293.3302357","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3301293.3302357","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3301293.3302357","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:58:02Z","timestamp":1750208282000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301293.3302357"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,22]]},"references-count":38,"alternative-id":["10.1145\/3301293.3302357","10.1145\/3301293"],"URL":"https:\/\/doi.org\/10.1145\/3301293.3302357","relation":{},"subject":[],"published":{"date-parts":[[2019,2,22]]},"assertion":[{"value":"2019-02-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}