{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T21:55:55Z","timestamp":1757627755313,"version":"3.44.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031998713"},{"type":"electronic","value":"9783031998720"}],"license":[{"start":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:00:00Z","timestamp":1755820800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:00:00Z","timestamp":1755820800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-99872-0_6","type":"book-chapter","created":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T11:08:55Z","timestamp":1755774535000},"page":"78-92","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Partial Detectors Versus Replication to Cope with Silent Errors"],"prefix":"10.1007","author":[{"given":"Anne","family":"Benoit","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Herault","sequence":"additional","affiliation":[]},{"given":"Yves","family":"Robert","sequence":"additional","affiliation":[]},{"given":"Alix","family":"Tremodeux","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,22]]},"reference":[{"key":"6_CR1","first-page":"8","volume":"98","author":"L Bautista-Gomez","year":"2016","unstructured":"Bautista-Gomez, L., Benoit, A., Cavelan, A., Raina, S., Robert, Y., Sun, H.: Coping with recall and precision of soft error detectors. JPDC 98, 8\u201324 (2016)","journal-title":"JPDC"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Bautista Gomez, L., Cappello, F.: Detecting silent data corruption through data dynamic monitoring for scientific applications. SIGPLAN 49(8), 381\u2013382 (2014)","DOI":"10.1145\/2692916.2555279"},{"issue":"2","key":"6_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2897189","volume":"3","author":"A Benoit","year":"2016","unstructured":"Benoit, A., Cavelan, A., Robert, Y., Sun, H.: Assessing general-purpose algorithms to cope with fail-stop and silent errors. ACM TOPC 3(2), 1\u201336 (2016)","journal-title":"ACM TOPC"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Benoit, A., Herault, T., Robert, Y., Tremodeux, A.: Artifact of the paper: partial detectors versus replication to cope with silent errors (2025). https:\/\/doi.org\/10.5281\/zenodo.15591615","DOI":"10.1007\/978-3-031-99872-0_6"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Benoit, A., Herault, T., Robert, Y., Tr\u00e9modeux, A.: Partial detectors versus replication to cope with silent errors. Research report 9581, INRIA (2025). https:\/\/inria.hal.science\/hal-04996292v1","DOI":"10.1007\/978-3-031-99872-0_6"},{"issue":"1","key":"6_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3624560","volume":"11","author":"A Benoit","year":"2024","unstructured":"Benoit, A., Perotin, L., Robert, Y., Vivien, F.: Checkpointing strategies to tolerate non-memoryless failures on HPC platforms. ACM Trans. Parallel Comput. 11(1), 1\u201326 (2024)","journal-title":"ACM Trans. Parallel Comput."},{"issue":"4","key":"6_CR7","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1177\/1094342014532297","volume":"29","author":"AR Benson","year":"2014","unstructured":"Benson, A.R., Schmit, S., Schreiber, R.: Silent error detection in numerical time-stepping schemes. Int. J. High Perform. Comput. Appl. 29(4), 403\u2013421 (2014)","journal-title":"Int. J. High Perform. Comput. Appl."},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Berrocal, E., Bautista-Gomez, L., Di, S., Lan, Z., Cappello, F.: Lightweight silent data corruption detection based on runtime data analysis for HPC applications. In: HPDC. ACM (2015)","DOI":"10.1145\/2749246.2749253"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Chen, Z.: Online-ABFT: an online algorithm based fault tolerance scheme for soft error detection in iterative methods. In: Proceedings of PPoPP, pp. 167\u2013176 (2013)","DOI":"10.1145\/2442516.2442533"},{"issue":"3","key":"6_CR10","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/j.future.2004.11.016","volume":"22","author":"JT Daly","year":"2006","unstructured":"Daly, J.T.: A higher order estimate of the optimum checkpoint interval for restart dumps. FGCS 22(3), 303\u2013312 (2006)","journal-title":"FGCS"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Herault, T., Robert, Y. (eds.) Fault-Tolerance Techniques for High-Performance Computing. Springer (2015)","DOI":"10.1007\/978-3-319-20943-2"},{"key":"6_CR12","unstructured":"Heroux, M., Hoemmen, M.: Fault-tolerant iterative methods via selective reliability. Research report SAND2011-3915 C, Sandia National Laboratories (2011)"},{"issue":"6","key":"6_CR13","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1109\/TC.1984.1676475","volume":"33","author":"K-H Huang","year":"1984","unstructured":"Huang, K.-H., Abraham, J.A.: Algorithm-based fault tolerance for matrix operations. IEEE Trans. Comput. 33(6), 518\u2013528 (1984)","journal-title":"IEEE Trans. Comput."},{"issue":"1","key":"6_CR14","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1145\/2189750.2150989","volume":"40","author":"AA Hwang","year":"2012","unstructured":"Hwang, A.A., Stefanovici, I.A., Schroeder, B.: Cosmic rays don\u2019t strike twice: understanding the nature of DRAM errors and the implications for system design. SIGARCH Comput. Archit. News 40(1), 111\u2013122 (2012)","journal-title":"SIGARCH Comput. Archit. News"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Li, S., Di, S., Zhao, K., Liang, X., Chen, Z., Cappello, F.: Resilient error-bounded lossy compressor for data transfer. In: SC 1994, SC 2021. ACM (2021)","DOI":"10.1145\/3458817.3476195"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Sao, P., Vuduc, R.: Self-stabilizing iterative solvers. In: ScalA 2013 (2013)","DOI":"10.1145\/2530268.2530272"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Shantharam, M., Srinivasmurthy, S., Raghavan, P.: Fault tolerant preconditioned conjugate gradient for sparse linear system solution. In: CS. ACM (2012)","DOI":"10.1145\/2304576.2304588"},{"key":"6_CR18","unstructured":"Tremodeux, A., Agullo, E., Benoit, A., Giraud, L., Herault, T., Robert, Y.: Fault-tolerant numerical iterative algorithms at scale. Technical Report RR-9567, Inria Lyon (2025)"},{"issue":"9","key":"6_CR19","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1145\/361147.361115","volume":"17","author":"JW Young","year":"1974","unstructured":"Young, J.W.: A first order approximation to the optimum checkpoint interval. Comm. ACM 17(9), 530\u2013531 (1974)","journal-title":"Comm. ACM"}],"container-title":["Lecture Notes in Computer Science","Euro-Par 2025: Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-99872-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T04:33:16Z","timestamp":1757478796000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-99872-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,22]]},"ISBN":["9783031998713","9783031998720"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-99872-0_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,8,22]]},"assertion":[{"value":"22 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Euro-Par","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dresden","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"europar2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.euro-par.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}