{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2013:LYACG4M7A4SN3LUY3BIUFPZB2N","short_pith_number":"pith:LYACG4M7","schema_version":"1.0","canonical_sha256":"5e0023719f0724ddae98d85142bf21d379de60ce7956c1a39488c34479a1ca6f","source":{"kind":"arxiv","id":"1308.5174","version":2},"attestation_state":"computed","paper":{"title":"BEEBS: Open Benchmarks for Energy Measurements on Embedded Platforms","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.PF","authors_text":"James Pallister, Jeremy Bennett, Simon Hollis","submitted_at":"2013-08-23T16:29:27Z","abstract_excerpt":"This paper presents and justifies an open benchmark suite named BEEBS, targeted at evaluating the energy consumption of embedded processors.\n  We explore the possible sources of energy consumption, then select individual benchmarks from contemporary suites to cover these areas. Version one of BEEBS is presented here and contains 10 benchmarks that cover a wide range of typical embedded applications. The benchmark suite is portable across diverse architectures and is freely available.\n  The benchmark suite is extensively evaluated, and the properties of its constituent programs are analysed. Us"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1308.5174","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.PF","submitted_at":"2013-08-23T16:29:27Z","cross_cats_sorted":[],"title_canon_sha256":"5b6ca7f95bcf908467c35245aabfafc5c05cc1a9c2bbb62aad1e17a95e3a4f37","abstract_canon_sha256":"c566f761582553e76d3626cf16b9ea6e9d01debeea7a4984aef134e8c7a2fac5"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:11:59.019239Z","signature_b64":"+GZnj6GFvhZX2qwDN0uTgLG02AAwkmHs45eH8AR/vek0wJ/mNXKZm4z3DjTDYqmK6Dp9r/2FDnzPYEEwE6rmDg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"5e0023719f0724ddae98d85142bf21d379de60ce7956c1a39488c34479a1ca6f","last_reissued_at":"2026-05-18T03:11:59.018608Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:11:59.018608Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"BEEBS: Open Benchmarks for Energy Measurements on Embedded Platforms","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.PF","authors_text":"James Pallister, Jeremy Bennett, Simon Hollis","submitted_at":"2013-08-23T16:29:27Z","abstract_excerpt":"This paper presents and justifies an open benchmark suite named BEEBS, targeted at evaluating the energy consumption of embedded processors.\n  We explore the possible sources of energy consumption, then select individual benchmarks from contemporary suites to cover these areas. Version one of BEEBS is presented here and contains 10 benchmarks that cover a wide range of typical embedded applications. The benchmark suite is portable across diverse architectures and is freely available.\n  The benchmark suite is extensively evaluated, and the properties of its constituent programs are analysed. Us"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1308.5174","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1308.5174","created_at":"2026-05-18T03:11:59.018729+00:00"},{"alias_kind":"arxiv_version","alias_value":"1308.5174v2","created_at":"2026-05-18T03:11:59.018729+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1308.5174","created_at":"2026-05-18T03:11:59.018729+00:00"},{"alias_kind":"pith_short_12","alias_value":"LYACG4M7A4SN","created_at":"2026-05-18T12:27:51.066281+00:00"},{"alias_kind":"pith_short_16","alias_value":"LYACG4M7A4SN3LUY","created_at":"2026-05-18T12:27:51.066281+00:00"},{"alias_kind":"pith_short_8","alias_value":"LYACG4M7","created_at":"2026-05-18T12:27:51.066281+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":2,"internal_anchor_count":1,"sample":[{"citing_arxiv_id":"2511.14088","citing_title":"Resolving Availability and Run-time Integrity Conflicts in Real-Time Embedded Systems","ref_index":40,"is_internal_anchor":true},{"citing_arxiv_id":"2604.23331","citing_title":"Branch Landing: Bloom Filter-Based Source Authorization for Forward-Edge CFI on RISC-V","ref_index":22,"is_internal_anchor":false}]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/LYACG4M7A4SN3LUY3BIUFPZB2N","json":"https://pith.science/pith/LYACG4M7A4SN3LUY3BIUFPZB2N.json","graph_json":"https://pith.science/api/pith-number/LYACG4M7A4SN3LUY3BIUFPZB2N/graph.json","events_json":"https://pith.science/api/pith-number/LYACG4M7A4SN3LUY3BIUFPZB2N/events.json","paper":"https://pith.science/paper/LYACG4M7"},"agent_actions":{"view_html":"https://pith.science/pith/LYACG4M7A4SN3LUY3BIUFPZB2N","download_json":"https://pith.science/pith/LYACG4M7A4SN3LUY3BIUFPZB2N.json","view_paper":"https://pith.science/paper/LYACG4M7","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1308.5174&json=true","fetch_graph":"https://pith.science/api/pith-number/LYACG4M7A4SN3LUY3BIUFPZB2N/graph.json","fetch_events":"https://pith.science/api/pith-number/LYACG4M7A4SN3LUY3BIUFPZB2N/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/LYACG4M7A4SN3LUY3BIUFPZB2N/action/timestamp_anchor","attest_storage":"https://pith.science/pith/LYACG4M7A4SN3LUY3BIUFPZB2N/action/storage_attestation","attest_author":"https://pith.science/pith/LYACG4M7A4SN3LUY3BIUFPZB2N/action/author_attestation","sign_citation":"https://pith.science/pith/LYACG4M7A4SN3LUY3BIUFPZB2N/action/citation_signature","submit_replication":"https://pith.science/pith/LYACG4M7A4SN3LUY3BIUFPZB2N/action/replication_record"}},"created_at":"2026-05-18T03:11:59.018729+00:00","updated_at":"2026-05-18T03:11:59.018729+00:00"}