{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T04:13:52Z","timestamp":1742789632532,"version":"3.40.2"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642286513"},{"type":"electronic","value":"9783642286520"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-28652-0_11","type":"book-chapter","created":{"date-parts":[[2012,3,22]],"date-time":"2012-03-22T21:02:02Z","timestamp":1332450122000},"page":"200-219","source":"Crossref","is-referenced-by-count":8,"title":["Compiler Support for Fine-Grain Software-Only Checkpointing"],"prefix":"10.1007","author":[{"given":"Chuck","family":"Zhao","sequence":"first","affiliation":[]},{"given":"J. Gregory","family":"Steffan","sequence":"additional","affiliation":[]},{"given":"Cristiana","family":"Amza","sequence":"additional","affiliation":[]},{"given":"Allan","family":"Kielstra","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Adl-Tabatabai, A., Lewis, B.T., Menon, V.S., Murphy, B.R., Saha, B., Shpeisman, T.: Compiler and runtime optimizations for efficient software transactional memory. In: ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI (2006)","DOI":"10.1145\/1133981.1133985"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, H., Demillo, R., Spafford, E.: An execution-backtracking approach to debugging. IEEE Transactions on Software (May-June 1991)","DOI":"10.1109\/52.88940"},{"key":"11_CR3","unstructured":"Agrawal, H., Demillo, R., Spafford, E.: Debugging with dynamic slicing and backtracking. Software: Practice and Experience (October 2006)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Akkary, H., Rajwar, R., Srinivasan, S.: Checkpoint processing and recovery: An efficient, scalable alternative to reorder buffers. IEEE Computer Society (2003)","DOI":"10.1109\/MM.2003.1261382"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Betz, V., Rose, J.: Vpr: A new packing, placement and routing tool for fpga research. In: VPR: A New Packing, Placement and Routing Tool for FPGA Research (1997)","DOI":"10.1007\/3-540-63465-7_226"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Betz, V., Rose, J., Marquardt, A.: Architecture and cad for deep-submicron fpgas. Kluwer Academic Publishers (February 1999)","DOI":"10.1007\/978-1-4615-5145-4"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Elnozahy, W., Johnson, D., Zwaenepoel, W.: The performance of consistent checkpointing. In: 11th Symposium on Reliable Distributed Systems, pp. 39-47 (October 1992)","DOI":"10.1109\/RELDIS.1992.235144"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Feldman, S.I., Brown, C.I.: Igor: A system for program debugging via reversible execution. In: ACM SIGPLAN Notices, Workshop on Parallel and Distributed Debugging (1989)","DOI":"10.1145\/68210.69226"},{"key":"11_CR9","unstructured":"Free Softwar Foundation. Gdb: the gnu debugger manual 7.0 (September 2009)"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Hammond, L., Willey, M., Olukotun, K.: Data speculation support for a chip multiprocessor. In: ACM SIGOPS Operating Systems (December 1998)","DOI":"10.1145\/291069.291020"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Hammond, L., Wong, V., Chen, M., Carlstrom, B.D., Davis, J.D., Hertzberg, B., Prabhu, M., Wijaya, H., Kozyrakis, C., Olukotun, K.: Transactional memory coherence and consistency. In: CM SIGARCH Computer Architecture News (March 2004)","DOI":"10.1145\/1037947.1024395"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Herlihy, M., Luchangco, V., Moir, M., Scherer, W.N.: Software transactional memory for dynamic-sized data structures. In: The Twenty-Second Annual Symposium on Principles of Distributed Computing (2003)","DOI":"10.1145\/872035.872048"},{"key":"11_CR13","volume-title":"Computer Science Division","author":"W. Hwu","year":"1987","unstructured":"Hwu, W., Patt, Y.: Checkpoint repair for out-of-order execution machines. In: Computer Science Division. ACM, University of California at Berkeley (1987)"},{"key":"11_CR14","unstructured":"Jagadish, H.V., Silberschatz, A., Sudarshan, S.: Recovering from main-memory lapses. In: Procs. of the International Conf. on Very Large Databases, VLDB (1993)"},{"key":"11_CR15","unstructured":"King, S.T., Dunlap, G.W., Chen, P.M.: Debugging operating systems with time-traveling virtual machines. In: Annual USENIX Technical Conference (2005)"},{"key":"11_CR16","unstructured":"Kingsley, G., Beck, M., Plank, J.: Compiler-assisted checkpoint optimization using suif. In: First SUIF Compiler Workshop (1995)"},{"key":"11_CR17","unstructured":"Lattner, C., Adve, V.: Llvm a compilation framework for lifelong program analysis and transformation. In: Proc. of the 2004 International Symposium on Code Generation and Optimization (CGO) (March 2004)"},{"key":"11_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/11532378_2","volume-title":"Languages and Compilers for High Performance Computing","author":"C. Lattner","year":"2005","unstructured":"Lattner, C., Adve, V.: The LLVM Compiler Framework and Infrastructure Tutorial. In: Eigenmann, R., Li, Z., Midkiff, S.P. (eds.) LCPC 2004. LNCS, vol.\u00a03602, pp. 15\u201316. Springer, Heidelberg (2005)"},{"issue":"10","key":"11_CR19","doi-asserted-by":"publisher","first-page":"871","DOI":"10.1002\/spe.4380241002","volume":"24","author":"C. Li","year":"1994","unstructured":"Li, C., Stewart, E., Fuchs, W.: Compiler-assisted full checkpointing. Software-practice and Experience\u00a024(10), 871\u2013886 (1994)","journal-title":"Software-practice and Experience"},{"key":"11_CR20","unstructured":"Lu, S., Li, Z., Qin, F., Tan, L., Zhou, P., Zhou, Y.: Bugbench: Benchmarks for evaluating bug detection tools. In: Workshop on the Evaluation of Software Defect Detection Tools (2005)"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Mcdonald, A., Chung, J., Carlstrom, B.D., Minh, C.C., Chafi, H., Kozyrakis, C., Olukotun, K.: Architectural semantics for practical transactional memory. Computer Architecture News (2006)","DOI":"10.1145\/1150019.1136491"},{"key":"11_CR22","unstructured":"Moore, K.E., Bobba, J., Moravan, M.J., Hill, M.D., Wood, D.A.: Logtm: Log-based transactional memory. In: High-Performance Computer Architecture (2006)"},{"key":"11_CR23","unstructured":"Eliot, J., Moss, B.: Log-based recovery for nested transactions. In: Proceedings of the 13th International Conference on Very Large Data Bases (1987)"},{"key":"11_CR24","unstructured":"Ng, W., Chen, P.: The symmetric improvement of fault tolerance in the rio file cache. In: Proceedings of 1999 Fault Tolerance Computing, FTC (1999)"},{"key":"11_CR25","unstructured":"Plank, J., Beck, M., Kingsley, G.: Compiler-assisted memory exclusion for fast checkpointing. In: IEEE Technical Committee on Operating System and Application Environments, Special Issue on Fault-Tolerance (1995)"},{"key":"11_CR26","unstructured":"Plank, J.S., Beck, M., Kingsley, G., Li, K.: Libckpt: Transparent checkpointing under unix. In: Usenix Winter Technical Conference (1995)"},{"key":"11_CR27","unstructured":"Chandra, S.: An evaluation of recovery related properties of software faults. Ph.D. thesis (2004)"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Saha, B., Adl-Tabatabai, A.-R., Hudson, R.L., Minh, C.C.: Mcrt-stm: A high performance software transactional memory system for a multi-core runtime. In: Principles and Practice of Parallel Programming, PPOPP (2006)","DOI":"10.1145\/1122971.1123001"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Gregory Steffan, J., Colohan, C.B., Zhai, A., Mowry, T.C.: A scalable approach to thread-level speculation. In: International Symposium on Computer Architecture (ISCA) (June 2000)","DOI":"10.1145\/339647.339650"},{"key":"11_CR30","unstructured":"Wang, Y., Huang, Y., Vo, K., Chung, P., Kintala, C.: Checkpointing and its applications. In: 25th Int. Symp. On Fault-Tol. Comp., pp. 22\u201331 (June 1995)"},{"key":"11_CR31","unstructured":"Whaley, J.: System checkpointing using reflection and program analysis"},{"key":"11_CR32","unstructured":"Xu, M., Malyugin, V., Sheldon, J., Venkitachalam, G., Weissman, B.: Retrace: Collecting execution trace with virtual machine deterministic replay. In: 3rd Workshop on Modeling, Benchmarking and Simulation (2007)"}],"container-title":["Lecture Notes in Computer Science","Compiler Construction"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28652-0_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,23]],"date-time":"2025-03-23T18:55:23Z","timestamp":1742756123000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-28652-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642286513","9783642286520"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28652-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}