{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T04:27:19Z","timestamp":1747196839907,"version":"3.40.5"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319143248"},{"type":"electronic","value":"9783319143255"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-14325-5_45","type":"book-chapter","created":{"date-parts":[[2014,12,10]],"date-time":"2014-12-10T08:55:04Z","timestamp":1418201704000},"page":"523-534","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An Automated Performance-Aware Approach to Reliability Transformations"],"prefix":"10.1007","author":[{"given":"Jacob","family":"Lidman","sequence":"first","affiliation":[]},{"given":"Sally A.","family":"McKee","sequence":"additional","affiliation":[]},{"given":"Daniel J.","family":"Quinlan","sequence":"additional","affiliation":[]},{"given":"Chunhua","family":"Liao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"45_CR1","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1177\/1094342009347767","volume":"23","author":"F. Cappello","year":"2009","unstructured":"Cappello, F., Geist, A., Gropp, B., Kale, L., Kramer, B., Snir, M.: Toward Exascale Resilience. International Journal of High Performance Computing Applications\u00a023(4), 374\u2013388 (2009)","journal-title":"International Journal of High Performance Computing Applications"},{"key":"45_CR2","unstructured":"Engelmann, C., Ong, H.H., Scott, S.L.: The Case for Modular Redundancy in Large-Scale High Performance Computing Systems. In: Proc. IASTED International Conference on Parallel and Distributed Computing and Networks (PDCN), pp. 189\u2013194 (February 2009), Related work"},{"key":"45_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1007\/978-3-642-54420-0_65","volume-title":"Euro-Par 2013: Parallel Processing Workshops","author":"D. Li","year":"2014","unstructured":"Li, D., Lee, S., Vetter, J.S.: Evaluating the viability of application-driven cooperative CPU\/GPU fault detection. In: an Mey, D., et al. (eds.) Euro-Par 2013. LNCS, vol.\u00a08374, pp. 670\u2013679. Springer, Heidelberg (2014)"},{"key":"45_CR4","doi-asserted-by":"crossref","unstructured":"Fiala, D., Mueller, F., Engelmann, C., Riesen, R., Ferreira, K., Brightwell, R.: Detection and Correction of Silent Data Corruption for Large-scale High-performance Computing. In: Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, pp. 78:1\u201378:12 (2012)","DOI":"10.2172\/1081941"},{"key":"45_CR5","doi-asserted-by":"crossref","unstructured":"Elliott, J., Kharbas, K., Fiala, D., Mueller, F., Ferreira, K., Engelmann, C.: Combining Partial Redundancy and Checkpointing for HPC. In: Proceedings of the International Conference on Distributed Computing Systems (ICDCS 2012), pp. 615\u2013626 (2012)","DOI":"10.1109\/ICDCS.2012.56"},{"key":"45_CR6","doi-asserted-by":"crossref","unstructured":"Shamsunder, R., Rosenkrantz, D.J., Ravi, S.S.: Exploiting Data Flow Information in Algorithm-Based Fault Tolerance. In: Proc. International Symposium on Fault-Tolerant Computing (FTCS), pp. 280\u2013289 (June 1993)","DOI":"10.1109\/FTCS.1993.627331"},{"key":"45_CR7","doi-asserted-by":"crossref","unstructured":"Lu, G., Zheng, Z., Chien, A.A.: When is Multi-version Checkpointing Needed? In: Proc. 3rd Workshop on Fault-Tolerance for HPC at Extreme Scale (FTXS), pp. 49\u201356 (June 2013)","DOI":"10.1145\/2465813.2465821"},{"key":"45_CR8","unstructured":"Misailovic, S., Carbin, M., Achour, S., Zichao, Q., Rinard, M.: Reliability-Aware Optimization of Approximate Computational Kernels with Rely. MIT-CSAIL-TR-2014-001 (January 2014)"},{"issue":"1","key":"45_CR9","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s11081-007-9001-7","volume":"8","author":"S. Boyd","year":"2007","unstructured":"Boyd, S., Kim, S.-J., Vandenberghe, L., Hassibi, A.: A tutorial on geometric programming. Optimization and Engineering\u00a08(1), 67\u2013127 (2007)","journal-title":"Optimization and Engineering"},{"key":"45_CR10","doi-asserted-by":"crossref","unstructured":"Carbin, M., Misailovic, S., Rinard, M.C.: Verifying Quantitative Reliability for Programs That Execute on Unreliable Hardware. In: Proc. SIGPLAN International Conference on Object Oriented Programming Systems Languages & Applications (OOPSLA), pp. 33\u201352 (October 2013)","DOI":"10.1145\/2544173.2509546"},{"key":"45_CR11","unstructured":"Quinlan, D., Liao, C.: The ROSE Source-to-Source Compiler Infrastructure. In: Cetus Users and Compiler Infrastructure Workshop, with the International Conference on Parallel Architectures and Compilation Techniques, PACT (October 2011)"},{"key":"45_CR12","unstructured":"Grant, M., Boyd, S.: CVX: Matlab Software for Disciplined Convex Programming, version 2.0 beta (June 2014), http:\/\/cvxr.com\/cvx"},{"key":"45_CR13","doi-asserted-by":"crossref","unstructured":"Grant, M.C., Boyd, S.P.: Graph Implementations for Nonsmooth Convex Programs. In: Blondel, V., Boyd, S., Kimura, H. (eds.) Recent Advances in Learning and Control. LNCIS, vol.\u00a0371, pp. 95\u2013110. Springer, Heidelberg (2008)","DOI":"10.1007\/978-1-84800-155-8_7"},{"issue":"2","key":"45_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2024716.2024718","volume":"39","author":"N. Binkert","year":"2011","unstructured":"Binkert, N., Beckmann, B., Black, G., Reinhardt, S.K., Saidi, A., Basu, A., Hestness, J., Hower, D.R., Krishna, T., Sardashti, S., Sen, R., Sewell, K., Shoaib, M., Vaish, N., Hill, M.D., Wood, D.A.: The Gem5 Simulator. Computer Architecture News\u00a039(2), 1\u20137 (2011)","journal-title":"Computer Architecture News"},{"key":"45_CR15","doi-asserted-by":"crossref","unstructured":"Lidman, J., Quinlan, D.J., Liao, C., McKee, S.A.: ROSE:FTTransform \u2013 A Source-to-Source Translation Framework for Exascale Fault-Tolerance Research. In: Proc. 2nd Workshop on Fault-Tolerance for HPC at Extreme Scale (FTXS), pp. 1\u20136 (June 2012)","DOI":"10.1109\/DSNW.2012.6264672"},{"key":"45_CR16","unstructured":"Rinard, M., Cadar, C., Dumitran, D., Roy, D.M., Leu, T., Beebee Jr., W.S.: Enhancing Server Availability and Security Through Failure-Oblivious Computing. In: Proc. 6th Symposium on Operating Systems Design & Implementation (OSDI), p. 21 (Decedmber 2004)"}],"container-title":["Lecture Notes in Computer Science","Euro-Par 2014: Parallel Processing Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-14325-5_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T00:19:04Z","timestamp":1747181944000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-14325-5_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319143248","9783319143255"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-14325-5_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}