{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:40:49Z","timestamp":1756384849982,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319102139"},{"type":"electronic","value":"9783319102146"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-10214-6_10","type":"book-chapter","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T11:56:12Z","timestamp":1412078172000},"page":"203-214","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Optimal Checkpointing Period: Time vs. Energy"],"prefix":"10.1007","author":[{"given":"Guillaume","family":"Aupy","sequence":"first","affiliation":[]},{"given":"Anne","family":"Benoit","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"H\u00e9rault","sequence":"additional","affiliation":[]},{"given":"Yves","family":"Robert","sequence":"additional","affiliation":[]},{"given":"Jack","family":"Dongarra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,1]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1177\/1094342009347714","volume":"23","author":"J Dongarra","year":"2009","unstructured":"Dongarra, J., Beckman, P., Aerts, P., Cappello, F., Lippert, T., Matsuoka, S., Messina, P., Moore, T., Stevens, R., Trefethen, A., Valero, M.: The international exascale software project: a call to cooperative action by the global high-performance community. Int. Journal of High Performance Computing Applications 23, 309\u2013322 (2009)","journal-title":"Int. Journal of High Performance Computing Applications"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Sarkar, V., et al.: Exascale software study: Software challenges in extreme scale systems (2009), White paper available at; http:\/\/users.ece.gatech.edu\/mrichard\/ExascaleComputingStudyReports\/ECSS%20report%20101909.pdf","DOI":"10.1088\/1742-6596\/180\/1\/012045"},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1145\/361147.361115","volume":"17","author":"JW Young","year":"1974","unstructured":"Young, J.W.: A first order approximation to the optimum checkpoint interval. Comm. of the ACM 17, 530\u2013531 (1974)","journal-title":"Comm. of the ACM"},{"key":"10_CR4","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/j.future.2004.11.016","volume":"22","author":"JT Daly","year":"2004","unstructured":"Daly, J.T.: A higher order estimate of the optimum checkpoint interval for restart dumps. FGCS 22, 303\u2013312 (2004)","journal-title":"FGCS"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-19328-6_1","volume-title":"High Performance Computing for Computational Science \u2013 VECPAR 2010","author":"J Shalf","year":"2011","unstructured":"Shalf, J., Dosanjh, S., Morrison, J.: Exascale computing technology challenges. In: Palma, J.M.L.M., Dayd\u00e9, M., Marques, O., Lopes, J.C. (eds.) VECPAR 2010. LNCS, vol. 6449, pp. 1\u201325. Springer, Heidelberg (2011)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Meneses, E., Sarood, O., Kal\u00e9, L.V.: Assessing Energy Efficiency of Fault Tolerance Protocols for HPC Systems. In: Proceedings of the 2012 IEEE 24th International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD 2012), New York, USA (2012)","DOI":"10.1109\/SBAC-PAD.2012.12"},{"issue":"1","key":"10_CR7","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/214451.214456","volume":"3","author":"KM Chandy","year":"1985","unstructured":"Chandy, K.M., Lamport, L.: Distributed snapshots: Determining global states of distributed systems. Transactions on Computer Systems 3(1), 63\u201375 (1985)","journal-title":"Transactions on Computer Systems"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Bosilca, G., Bouteiller, A., Brunet, E., Cappello, F., Dongarra, J., Guermouche, A., H\u00e9rault, T., Robert, Y., Vivien, F., Zaidouni, D.: Unified model for assessing checkpointing protocols at extreme-scale. Concurrency and Computation: Practice and Experience (2013) (to be published); Also available as INRIA research report 7950 at http:\/\/graal.ens-lyon.fr\/~yrobert","DOI":"10.1002\/cpe.3173"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Ferreira, K., Stearley, J., Laros, J.H.I., Oldfield, R., Pedretti, K., Brightwell, R., Riesen, R., Bridges, P.G., Arnold, D.: Evaluating the Viability of Process Replication Reliability for Exascale Systems. In: Proc. of the ACM\/IEEE SC Conf. (2011)","DOI":"10.1145\/2063384.2063443"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Zheng, G., Ni, X., Kal\u00e9, L.V.: A scalable double in-memory checkpoint and restart scheme towards exascale. In: Dependable Systems and Networks Workshops (DSN-W) (2012)","DOI":"10.1109\/DSNW.2012.6264677"},{"key":"10_CR11","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1142\/S0129626411000126","volume":"21","author":"F Cappello","year":"2011","unstructured":"Cappello, F., Casanova, H., Robert, Y.: Preventive migration vs. preventive checkpointing for extreme scale supercomputers. Parallel Processing Letters 21, 111\u2013132 (2011)","journal-title":"Parallel Processing Letters"},{"key":"10_CR12","unstructured":"Zheng, G., Shi, L., Kal\u00e9, L.V.: FTC-Charm++: an in-memory checkpoint-based fault tolerant runtime for Charm++ and MPI. In: Proc. 2004 IEEE Int. Conf. Cluster Computing. IEEE Computer Society (2004)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Ni, X., Meneses, E., Kal\u00e9, L.V.: Hiding checkpoint overhead in HPC applications with a semi-blocking algorithm. In: Proc. 2012 IEEE Int. Conf. Cluster Computing. IEEE Computer Society (2012)","DOI":"10.1109\/CLUSTER.2012.82"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Dongarra, J., H\u00e9rault, T., Robert, Y.: Revisiting the double checkpointing algorithm. In: 15th Workshop on Advances in Parallel and Distributed Computational Models, APDCM 2013. IEEE Computer Society Press (2013)","DOI":"10.1109\/IPDPSW.2013.11"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Rajachandrasekar, R., Moody, A., Mohror, K., Panda, D.K.D.: A 1 PB\/s file system to checkpoint three million MPI tasks. In: Proceedings of the 22nd International Symposium on High-Performance Parallel and Distributed Computing, HPDC 2013, pp. 143\u2013154. ACM, New York (2013)","DOI":"10.1145\/2493123.2462908"}],"container-title":["Lecture Notes in Computer Science","High Performance Computing Systems. Performance Modeling, Benchmarking and Simulation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10214-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,16]],"date-time":"2023-07-16T22:40:47Z","timestamp":1689547247000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-10214-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319102139","9783319102146"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10214-6_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"1 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}