{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:41:46Z","timestamp":1742928106997,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030598501"},{"type":"electronic","value":"9783030598518"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-59851-8_1","type":"book-chapter","created":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T18:04:00Z","timestamp":1603130640000},"page":"5-18","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Compiler-Assisted Type-Safe Checkpointing"],"prefix":"10.1007","author":[{"given":"Jan-Patrick","family":"Lehr","sequence":"first","affiliation":[]},{"given":"Alexander","family":"H\u00fcck","sequence":"additional","affiliation":[]},{"given":"Moritz","family":"Fischer","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Bischof","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,20]]},"reference":[{"key":"1_CR1","doi-asserted-by":"publisher","unstructured":"Averick, B., Carter, R., Xue, G.L., More, J.: The MINPACK-2 test problem collection (1992). https:\/\/doi.org\/10.2172\/79972","DOI":"10.2172\/79972"},{"key":"1_CR2","doi-asserted-by":"publisher","unstructured":"Bautista-Gomez, L., Tsuboi, S., Komatitsch, D., Cappello, F., Maruyama, N., Matsuoka, S.: FTI: high performance fault tolerance interface for hybrid systems. In: Proceedings of 2011 International Conference for High Performance Computing, Networking, Storage and Analysis, SC 2011. ACM (2011). https:\/\/doi.org\/10.1145\/2063384.2063427","DOI":"10.1145\/2063384.2063427"},{"key":"1_CR3","doi-asserted-by":"publisher","unstructured":"Bockhorn, A., Narayanan, S.H.K., Walther, A.: Checkpointing approaches for the computation of adjoints covering resilience issues. In: 2020 Proceedings of the SIAM Workshop on Combinatorial Scientific Computing, pp. 22\u201331. SIAM (2020). https:\/\/doi.org\/10.1137\/1.9781611976229.3","DOI":"10.1137\/1.9781611976229.3"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-642-33826-7_16","volume-title":"Software Engineering and Formal Methods","author":"P Cuoq","year":"2012","unstructured":"Cuoq, P., Kirchner, F., Kosmatov, N., Prevosto, V., Signoles, J., Yakobowski, B.: Frama-C. In: Eleftherakis, G., Hinchey, M., Holcombe, M. (eds.) SEFM 2012. LNCS, vol. 7504, pp. 233\u2013247. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33826-7_16"},{"key":"1_CR5","doi-asserted-by":"publisher","first-page":"042501","DOI":"10.1103\/PhysRevLett.122.042501","volume":"122","author":"C Drischler","year":"2019","unstructured":"Drischler, C., Hebeler, K., Schwenk, A.: Chiral interactions up to next-to-next-to-next-to-leading order and nuclear saturation. Phys. Rev. Lett. 122, 042501 (2019). https:\/\/doi.org\/10.1103\/PhysRevLett.122.042501","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"1_CR6","doi-asserted-by":"publisher","first-page":"1302","DOI":"10.1007\/s11227-013-0884-0","volume":"65","author":"IP Egwutuoha","year":"2013","unstructured":"Egwutuoha, I.P., Levy, D., Selic, B., Chen, S.: A survey of fault tolerance mechanisms and checkpoint\/restart implementations for high performance computing systems. J. Supercomput. 65(3), 1302\u20131326 (2013). https:\/\/doi.org\/10.1007\/s11227-013-0884-0","journal-title":"J. Supercomput."},{"key":"1_CR7","unstructured":"FTI: FTI public GitHub examples (2017). https:\/\/github.com\/leobago\/fti\/tree\/master\/examples. Accessed Mar 2020"},{"key":"1_CR8","doi-asserted-by":"publisher","unstructured":"Cao, G., Singhal, M.: On coordinated checkpointing in distributed systems. IEEE Trans. Parallel Distrib. Syst. 9(12), 1213\u20131225 (1998). https:\/\/doi.org\/10.1109\/71.737697","DOI":"10.1109\/71.737697"},{"key":"1_CR9","doi-asserted-by":"publisher","unstructured":"Hilbrich, T., Protze, J., Schulz, M., de Supinski, B.R., M\u00fcller, M.S.: MPI runtime error detection with MUST: advances in deadlock detection. In: Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, SC 2012, pp. 1\u201310, November 2012. https:\/\/doi.org\/10.1109\/SC.2012.79","DOI":"10.1109\/SC.2012.79"},{"key":"1_CR10","doi-asserted-by":"publisher","unstructured":"H\u00fcck, A., et al.: Compiler-aided type tracking for correctness checking of MPI applications. In: 2018 IEEE\/ACM 2nd International Workshop on Software Correctness for HPC Applications (Correctness), pp. 51\u201358, November 2018. https:\/\/doi.org\/10.1109\/Correctness.2018.00011","DOI":"10.1109\/Correctness.2018.00011"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Karlin, I., Keasler, J., Neely, R.: LULESH 2.0 updates and changes. Technical report LLNL-TR-641973, August 2013","DOI":"10.2172\/1090032"},{"key":"1_CR12","unstructured":"Lehr, J.P.: Conway\u2019s game of life (2016). https:\/\/github.com\/jplehr\/GameOfLife\/tree\/master\/serial_template. Accessed Mar 2020"},{"key":"1_CR13","doi-asserted-by":"publisher","unstructured":"Liu, Y., Nassar, R., Leangsuksun, C., Naksinehaboon, N., Paun, M., Scott, S.: A reliability-aware approach for an optimal checkpoint\/restart model in HPC environments. In: 2007 IEEE International Conference on Cluster Computing, pp. 452\u2013457 (2007). https:\/\/doi.org\/10.1109\/CLUSTR.2007.4629264","DOI":"10.1109\/CLUSTR.2007.4629264"},{"key":"1_CR14","doi-asserted-by":"publisher","unstructured":"Lotz, J., Naumann, U., Mitra, S.: Mixed integer programming for call tree reversal. In: 2016 Proceedings of the SIAM Workshop on Combinatorial Scientific Computing, pp. 83\u201391. SIAM (2016). https:\/\/doi.org\/10.1137\/1.9781611974690.ch9","DOI":"10.1137\/1.9781611974690.ch9"},{"key":"1_CR15","doi-asserted-by":"publisher","unstructured":"Maro\u00f1as, M., Mateo, S., Beltran, V., Ayguad\u00e9, E.: A directive-based approach to perform persistent checkpoint\/restart. In: 2017 International Conference on High Performance Computing Simulation (HPCS), pp. 442\u2013451 (2017). https:\/\/doi.org\/10.1109\/HPCS.2017.72","DOI":"10.1109\/HPCS.2017.72"},{"key":"1_CR16","doi-asserted-by":"publisher","unstructured":"Milewicz, R., Vanka, R., Tuck, J., Quinlan, D., Pirkelbauer, P.: Runtime checking C programs. In: Proceedings of the 30th Annual ACM Symposium on Applied Computing, SAC 2015, 2107\u20132114. ACM (2015). https:\/\/doi.org\/10.1145\/2695664.2695906","DOI":"10.1145\/2695664.2695906"},{"key":"1_CR17","doi-asserted-by":"publisher","unstructured":"Nicolae, B., Moody, A., Gonsiorowski, E., Mohror, K., Cappello, F.: VeloC: Towards high performance adaptive asynchronous checkpointing at large scale. In: 2019 IEEE International Parallel and Distributed Processing Symposium (IPDPS), pp. 911\u2013920, May 2019. https:\/\/doi.org\/10.1109\/IPDPS.2019.00099","DOI":"10.1109\/IPDPS.2019.00099"},{"key":"1_CR18","doi-asserted-by":"publisher","unstructured":"Rigger, M., Mayrhofer, R., Schatz, R., Grimmer, M., M\u00f6ssenb\u00f6ck, H.: Introspection for C and its applications to library robustness. Art Sci. Eng. Program. 2(2), 1\u201331 (2018). https:\/\/doi.org\/10.22152\/programming-journal.org\/2018\/2\/4","DOI":"10.22152\/programming-journal.org\/2018\/2\/4"},{"key":"1_CR19","doi-asserted-by":"publisher","unstructured":"Subasi, O., Kestor, G., Krishnamoorthy, S.: Toward a general theory of optimal checkpoint placement. In: 2017 IEEE International Conference on Cluster Computing (CLUSTER), pp. 464\u2013474 (2017). https:\/\/doi.org\/10.1109\/CLUSTER.2017.127","DOI":"10.1109\/CLUSTER.2017.127"}],"container-title":["Lecture Notes in Computer Science","High Performance Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-59851-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T15:48:08Z","timestamp":1619279288000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-59851-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030598501","9783030598518"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-59851-8_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"20 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC High Performance","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on High Performance Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Frankfurt am Main","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"35","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"supercomputing2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.isc-hpc.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Linklings","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"87","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.73","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.33","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}