{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:35:59Z","timestamp":1729676159339,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/ipdps.2004.1302982","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T10:19:45Z","timestamp":1086862785000},"page":"58-67","source":"Crossref","is-referenced-by-count":18,"title":["On the feasibility of incremental checkpointing for scienti .c computing"],"prefix":"10.1109","author":[{"given":"J.C.","family":"Sancho","sequence":"first","affiliation":[]},{"given":"F.","family":"Petrini","sequence":"additional","affiliation":[]},{"given":"G.","family":"Johnson","sequence":"additional","affiliation":[]},{"given":"J.","family":"Fernandez","sequence":"additional","affiliation":[]},{"given":"E.","family":"Frachtenberg","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/71.730527"},{"key":"17","article-title":"Transparent checkpointing under unix","author":"plank","year":"1995","journal-title":"Proceedings of the USENIX Winter 1995 Technical Conference"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(199902)29:2<125::AID-SPE224>3.0.CO;2-7"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1990.89337"},{"key":"16","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1049\/ecej:20020105","article-title":"autonomic computing: the next era of computing","volume":"14","author":"mainsah","year":"2002","journal-title":"Electronics & Communication Engineering Journal"},{"journal-title":"Computer Architecture A Quantitative Approach","year":"2002","author":"hennessy","key":"13"},{"key":"14","article-title":"Predictive performance and scalability modeling of a large-scale application","author":"kerbyson","year":"2001","journal-title":"Proc Supercomputing"},{"key":"11","article-title":"Storm: Lightning-fast resource management","author":"frachtenberg","year":"2002","journal-title":"Proc Supercomputing"},{"journal-title":"Development of naturally fault tolerant algorithms for computing on 100 000 processors","year":"2002","author":"geist","key":"12"},{"key":"21","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0022292","article-title":"Managing checkpoints for parallel programs","author":"pruyne","year":"1996","journal-title":"Proceedings of the IPPS Second Workshop on Job Scheduling Strategies for Parallel Processing"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/88.311574"},{"key":"22","doi-asserted-by":"crossref","DOI":"10.1109\/ISCA.2002.1003567","article-title":"Revive: Cost-effective architectural support for rollback recovery in shared-memory multiprocessors","author":"prvulovic","year":"2002","journal-title":"Proceedings of the International Symposium on Computer Architecture"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1995.466997"},{"journal-title":"SCSI Hard Drive Seagate Model Cheetah","year":"0","key":"24"},{"key":"25","doi-asserted-by":"crossref","DOI":"10.1109\/ISCA.2002.1003568","article-title":"SafetyNet: Improving the availability of shared memory multiprocessors with global checkpoint\/recovery","author":"sorin","year":"2002","journal-title":"Proceedings of the International Symposium on Computer Architecture"},{"journal-title":"STREAM Benchmark Results","year":"0","key":"26"},{"journal-title":"The ASCI Sweep3D Benchmark Code","year":"0","key":"27"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/HPDC.1999.805295"},{"key":"2","article-title":"An overview of the BlueGene\/L supercomputer","author":"adiga","year":"2002","journal-title":"Proceedings of the Supercomputing also IBM Research Report RC22570 (W0209-033)"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/568522.568525"},{"key":"1","article-title":"Quadrics QsNet II: A network for supercomputing applications","volume":"14","author":"addison","year":"2003","journal-title":"Proceedings of the Hot Chips"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/58564.58565"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1006\/jpdc.1997.1338"},{"journal-title":"The NAS Parallel Benchmarks 2 0","year":"1995","author":"bailey","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSN.2000.857514"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.1023\/A:1007970807301","article-title":"CLIP - A checkpointing tool for message-passing parallel programs","author":"chen","year":"1997","journal-title":"Proc Supercomputing"},{"key":"8","article-title":"Automated application-level checkpointing of MPI programs","author":"bronevetsky","year":"2003","journal-title":"Principles and Practice of Parallel Programming"}],"event":{"name":"18th International Parallel and Distributed Processing Symposium, 2004.","location":"Santa Fe, NM, USA"},"container-title":["18th International Parallel and Distributed Processing Symposium, 2004. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9132\/28950\/01302982.pdf?arnumber=1302982","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T03:57:39Z","timestamp":1497585459000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1302982\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/ipdps.2004.1302982","relation":{},"subject":[]}}