Theft-induced checkpointing for reconfigurable dataflow applications | IEEE Conference Publication | IEEE Xplore