{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:08:43Z","timestamp":1725473323814},"reference-count":43,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/milcom.2011.6127514","type":"proceedings-article","created":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T11:34:31Z","timestamp":1330601671000},"page":"1472-1479","source":"Crossref","is-referenced-by-count":0,"title":["Computational resiliency for distributed applications"],"prefix":"10.1109","author":[{"given":"Kathleen","family":"McGill","sequence":"first","affiliation":[]},{"given":"Stephen","family":"Taylor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2002.1017154"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2007.370296"},{"key":"17","first-page":"399","article-title":"Techniques for migrating computations on the grid","author":"chaudhary","year":"2006","journal-title":"Engineering the Grid Status and Perspective"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1142\/S0129054197000215"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380210802"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/GCC.2009.21"},{"key":"15","article-title":"The design and implementation of checkpoint\/restart process fault tolerance for OpenMPI","author":"hursey","year":"0","journal-title":"Proc of the 21st IEEE International Parallel and Distributed Processing Symposium March 2007"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1145\/383962.384010"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/367701.367728"},{"journal-title":"Process Migration for Resilient Applications","year":"2011","author":"mcgill","key":"39"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1131322.1131340"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1177\/1094342005056139"},{"key":"37","article-title":"A Vector-based Strategy for Dynamic Resource Allocation","author":"watts","year":"1998","journal-title":"Concurrency Practice and Experience"},{"journal-title":"CRAK Linux Checkpoint \/ Restart As A Kernel Module","year":"2001","author":"zhong","key":"11"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/TEPRA.2011.5753493"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/46\/1\/067"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.33"},{"key":"20","article-title":"Proactive Process-Level Live Migration in HPC Environments","author":"wang","year":"0","journal-title":"Proceedings of the 2008 ACM\/IEEE Conference on Supercomputer 2008"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1145\/1365815.1365816"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1096-9128(200001)12:1<1::AID-CPE433>3.0.CO;2-S"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2011.5747399"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.2514\/3.26808"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060323"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.98"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-006-9056-2"},{"key":"25","article-title":"Transparent Redundant Computing with MPI","author":"brightwell","year":"0","journal-title":"Proc of EuroPVM\/MPI 2010"},{"key":"26","article-title":"VolpexMPI: An MPI Library for Execution of Parallel Applications on Volatile Nodes","author":"leblanc","year":"0","journal-title":"Proc of the 16th European PVM\/MPI Users' Group Meeting on Recent Advances in Parallel Virtual Machine and Message Passing Interface Helsinki Finland September 2009"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2001.923171"},{"key":"28","article-title":"Failure detection n large scale systems: A survey","author":"pasin","year":"0","journal-title":"Proc of the IEEE Network Operations and Management Symposium Workshops July 2008"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/226643.226647"},{"journal-title":"Intrusion Detection Systems","year":"2008","author":"di pietro","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2007.35"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2003.819502"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/50202.50214"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2001.992691"},{"key":"7","first-page":"179","article-title":"Copilot- A Coprocessor-based Kernel Runtime Integrity Monitor","author":"petroni","year":"0","journal-title":"Proc of the 13th USENIX Security Symposium 2004"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/INFTECH.2008.4621669"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2002.1028920"},{"key":"5","first-page":"18","article-title":"The design and implementation of tripwire: A file system integrity checker","author":"kim","year":"1994","journal-title":"Proc of ACM Conference on Computer and Communications Security"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1004595"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-47653-7_3"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1002\/qre.474"},{"key":"8","first-page":"1","article-title":"Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing","author":"riley","year":"0","journal-title":"Proc of the 11th International Symposium on Recent Advances in Intrusion Detection 2008"}],"event":{"name":"MILCOM 2011 - 2011 IEEE Military Communications Conference","start":{"date-parts":[[2011,11,7]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2011,11,10]]}},"container-title":["2011 - MILCOM 2011 Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6111660\/6127424\/06127514.pdf?arnumber=6127514","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T12:52:57Z","timestamp":1490100777000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6127514\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/milcom.2011.6127514","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}