{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T10:40:02Z","timestamp":1750848002375,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":31,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819687305","type":"print"},{"value":"9789819687312","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-8731-2_18","type":"book-chapter","created":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T09:59:38Z","timestamp":1750845578000},"page":"182-193","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["GraphFT: A Lightweight Fault-tolerant Framework for\u00a0Iterative Graph Processing"],"prefix":"10.1007","author":[{"given":"Xiaohui","family":"Wei","sequence":"first","affiliation":[]},{"given":"Mengting","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Nan","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Hengshan","family":"Yue","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,21]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Dathathri, R., Gill, G., Hoang, L., Pingali, K.: Phoenix: a substrate for resilient distributed graph analytics. In: ASPLOS. pp. 615\u2013630 (2019)","DOI":"10.1145\/3297858.3304056"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Didehban, M., Lokam, S.R.D., Shrivastava, A.: Incheck: an in-application retimizing scovery scheme for soft errors. In: DAC. pp.\u00a01\u20136. ACM (2017)","DOI":"10.1145\/3061639.3062265"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Duell, J.: The design and implementation of berkeley lab\u2019s linux checkpoint\/restart (2005)","DOI":"10.2172\/891617"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Feng, Y., Vanam, S., et\u00a0al.: Investigating code generation performance of chatgpt with crowdsourcing social data. In: IEEE 47th IEEE 47th COMPSAC (2023)","DOI":"10.1109\/COMPSAC57700.2023.00117"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Fu, Z., Personick, M., Thompson, B.: Mapgraph: a high level api for fast development of high performance graph analytics on gpus. In: Proc. Workshop GRAph Data Manag. Exp. Syst. pp.\u00a01\u20136 (2014)","DOI":"10.1145\/2621934.2621936"},{"key":"18_CR6","volume-title":"Fluid-shuttle: Efficient cloud data transmission based on serverless computing compression","author":"R Gu","year":"2024","unstructured":"Gu, R., Wang, S., Dai, H., et al.: Fluid-shuttle: Efficient cloud data transmission based on serverless computing compression. IEEE\/ACM T, Networking (2024)"},{"issue":"2","key":"18_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3382132","volume":"17","author":"C Kalra","year":"2020","unstructured":"Kalra, C., Previlon, F., et al.: Armorall: compiler-based resilience targeting gpu applications. ACM TACO 17(2), 1\u201324 (2020)","journal-title":"ACM TACO"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Laguna, I., Schulz, M., Richards, D.F., et\u00a0al.: Ipas: intelligent protection against silent output corruption in scientific applications. In: Proc. CGO \u201916. pp. 227\u2013238 (2016)","DOI":"10.1145\/2854038.2854059"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Li, G., Pattabiraman, K., et\u00a0al.: Modeling soft-error propagation in programs. In: IEEE DSN. pp. 27\u201338 (2018)","DOI":"10.1109\/DSN.2018.00016"},{"key":"18_CR10","unstructured":"Ling, C., Jiang, J., et\u00a0al.: Deep graph representation learning and optimization for influence maximization. In: ICML (2023)"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Lu, H., et\u00a0al.: The effects of using chaotic map on improving the performance of multiobjective evolutionary algorithms. Mathe. Probl. Eng. 1(924652) (2014)","DOI":"10.1155\/2014\/924652"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Mahmoud, A., Hari, S., et\u00a0al.: Optimizing software-directed instruction replication for gpu error detection. In: IEEE SC. pp. 842\u2013854 (2018)","DOI":"10.1109\/SC.2018.00070"},{"key":"18_CR13","unstructured":"Mukherjee, S.: Architecture design for soft errors. Morgan Kaufmann (2011)"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Nicolae, B., Moody, A., Gonsiorowski, E., et\u00a0al.: VELOC: towards high performance adaptive asynchronous checkpointing at large scale. In: IEEE IPDPS. pp. 911\u2013920 (2019)","DOI":"10.1109\/IPDPS.2019.00099"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Nie, B., Jog, A., Smirni, E.: Characterizing accuracy-aware resilience of gpgpu applications. In: IEEE CCGRID. pp. 111\u2013120 (2020)","DOI":"10.1109\/CCGrid49817.2020.00-82"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Qiu, M., Liu, J., et\u00a0al.: A novel energy-aware fault tolerance mechanism for wireless sensor networks. In: IEEE\/ACM Conf. GCC (2011)","DOI":"10.1109\/GreenCom.2011.18"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Qiu, M., Qiu, H.: Review on image processing based adversarial example defenses in computer vision. In: IEEE 6th Intl Conf. BigDataSecurity. pp. 94\u201399 (2020)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00027"},{"issue":"1","key":"18_CR18","first-page":"43","volume":"4","author":"M Qiu","year":"2006","unstructured":"Qiu, M., Zhang, K., Huang, M.: Usability in mobile interface browsing. Web Intell. Agent Syst. 4(1), 43\u201359 (2006)","journal-title":"Web Intell. Agent Syst."},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Reis, G.A., Chang, J., August, D.I.: Automatic instruction-level software-only recovery. IEEE micro 27(1), 36\u201347 (2007)","DOI":"10.1109\/MM.2007.4"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Roy, A., Mihailovic, I., Zwaenepoel, W.: X-stream: edge-centric graph processing using streaming partitions. In: SOSP. pp. 472\u2013488 (2013)","DOI":"10.1145\/2517349.2522740"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Sabet, A., Zhao, Z., Gupta, R.: Subway: Minimizing data transfer during out-of-gpu-memory graph processing. In: EuroSys. pp. 1\u201316 (2020)","DOI":"10.1145\/3342195.3387537"},{"issue":"2","key":"18_CR22","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1145\/3296957.3173180","volume":"53","author":"A Sabet","year":"2018","unstructured":"Sabet, A., Qiu, J., Zhao, Z.: Tigr: transforming irregular graphs for gpu-friendly graph processing. ACM SIGPLAN Notices 53(2), 622\u2013636 (2018)","journal-title":"ACM SIGPLAN Notices"},{"issue":"9","key":"18_CR23","first-page":"6163","volume":"16","author":"Y Song","year":"2019","unstructured":"Song, Y., Li, Y., et al.: Retraining strategy-based domain adaption network for intelligent fault diagnosis. IEEE TII 16(9), 6163\u20136171 (2019)","journal-title":"IEEE TII"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Tsai, T., Hari, S.K.S., Sullivan, M., et\u00a0al.: Nvbitfi: dynamic fault injection for gpus. In: IEEE DSN. pp. 284\u2013291 (2021)","DOI":"10.1109\/DSN48987.2021.00041"},{"issue":"1","key":"18_CR25","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1109\/COMST.2021.3134955","volume":"24","author":"X Wei","year":"2021","unstructured":"Wei, X., Guo, H., et al.: Reliable data collection techniques in underwater wireless sensor networks: a survey. IEEE Comm. Surv. Tuto. 24(1), 404\u2013431 (2021)","journal-title":"IEEE Comm. Surv. Tuto."},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"Wei, X., Wu, Y., Jiang, N., Yue, H.: Detecting sdcs in gpgpus through efficient partial thread redundancy. In: ICA3PP. pp. 224\u2013239. Springer (2023)","DOI":"10.1007\/978-981-97-0862-8_14"},{"key":"18_CR27","doi-asserted-by":"crossref","unstructured":"Yang, L., Nie, B., Jog, A., Smirni, E.: Enabling software resilience in gpgpu applications via partial thread protection. In: IEEE ICSE. pp. 1248\u20131259 (2021)","DOI":"10.1109\/ICSE43902.2021.00114"},{"key":"18_CR28","doi-asserted-by":"crossref","unstructured":"Zeng, Y., Pan, M., et\u00a0al.: Narcissus: a practical clean-label backdoor attack with limited information. In: ACM CCS (2023)","DOI":"10.1145\/3576915.3616617"},{"issue":"4","key":"18_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3477603","volume":"18","author":"Y Zhang","year":"2021","unstructured":"Zhang, Y., Peng, D., Liao, X., et al.: Largegraph: an efficient dependency-aware gpu-accelerated large-scale graph processing. ACM TACO 18(4), 1\u201324 (2021)","journal-title":"ACM TACO"},{"issue":"4","key":"18_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3416495","volume":"17","author":"Y Zhang","year":"2020","unstructured":"Zhang, Y., Liao, X., Gu, L., et al.: Asyngraph: maximizing data parallelism for efficient iterative graph processing on gpus. ACM TACO 17(4), 1\u201321 (2020)","journal-title":"ACM TACO"},{"issue":"10","key":"18_CR31","first-page":"2249","volume":"30","author":"S Zhou","year":"2019","unstructured":"Zhou, S., Kannan, R., Prasanna, V.K., et al.: Hitgraph: high-throughput graph processing framework on FPGA. IEEE TPDS 30(10), 2249\u20132264 (2019)","journal-title":"IEEE TPDS"}],"container-title":["Lecture Notes in Computer Science","Wireless Artificial Intelligent Computing Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-8731-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T09:59:46Z","timestamp":1750845586000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-8731-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819687305","9789819687312"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-8731-2_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"21 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"WASA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Wireless Artificial Intelligent Computing Systems and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tokyo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wasa2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wasa-conference.org\/WASA2025\/index.html#","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}