{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T12:11:27Z","timestamp":1771330287094,"version":"3.50.1"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2018,4,1]],"date-time":"2018-04-01T00:00:00Z","timestamp":1522540800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["2017YFB1003103"],"award-info":[{"award-number":["2017YFB1003103"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["61232008"],"award-info":[{"award-number":["61232008"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["61722208"],"award-info":[{"award-number":["61722208"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Tsinghua University Initiative Scientific Research Program"},{"name":"Microsoft Research Asia Collaborative Research Program","award":["FY16-RES-THEME-095"],"award-info":[{"award-number":["FY16-RES-THEME-095"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Parallel Distrib. Syst."],"published-print":{"date-parts":[[2018,4,1]]},"DOI":"10.1109\/tpds.2017.2781257","type":"journal-article","created":{"date-parts":[[2017,12,8]],"date-time":"2017-12-08T19:52:40Z","timestamp":1512762760000},"page":"758-771","source":"Crossref","is-referenced-by-count":11,"title":["An Efficient In-Memory Checkpoint Method and its Practice on Fault-Tolerant HPL"],"prefix":"10.1109","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1692-3964","authenticated-orcid":false,"given":"Xiongchao","family":"Tang","sequence":"first","affiliation":[]},{"given":"Jidong","family":"Zhai","sequence":"additional","affiliation":[]},{"given":"Bowen","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Wenguang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Weimin","family":"Zheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5224-4048","authenticated-orcid":false,"given":"Keqin","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2016.7590316"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1109\/TST.2016.7488743","article-title":"An anomalous behavior detection model in cloud computing","volume":"21","author":"ye","year":"2016","journal-title":"Tsinghua Sci Technol"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2010.48"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2007.370307"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3018743.3018745"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2009.4"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2012.48"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2600212.2600232"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/9780470546345"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/HiPC.2011.6152716"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1995896.1995923"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2537334"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1654059.1654117"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/11846802_26"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-013-0884-0"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575356"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45255-9_47"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2063384.2063443"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.2172\/1081941"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/322123.322131"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2010.40"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/71.730527"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32820-6_48"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1994.315631"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2063384.2063427"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1996130.1996142"},{"key":"ref29","article-title":"Fault-tolerance techniques for computing at scale","author":"robert","year":"2014","journal-title":"Proc IEEE\/ACM Int Conf Cluster Cloud Grid Comput"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1048935.1050176"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1065944.1065973"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2442516.2442533"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1006209.1006248"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2004.11.016"},{"key":"ref1","year":"0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/46\/1\/067"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2012.45"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1984.1676475"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2012.6264677"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2503210.2503226"},{"key":"ref41","first-page":"93","article-title":"FTC-Charm++: An in-memory checkpoint-based fault tolerant runtime for Charm++ and MPI","author":"zheng","year":"2004","journal-title":"Proc IEEE Int Conf Cluster Comput"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1542275.1542326"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/50202.50214"},{"key":"ref43","first-page":"1","article-title":"LX-SSD: Enhancing the lifespan of NAND flash-based memory via recycling invalid page","author":"zhou","year":"2017","journal-title":"Proc 30th Int Conf Massive Storage Syst Technol"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2010.18"}],"container-title":["IEEE Transactions on Parallel and Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/71\/8314284\/08170311.pdf?arnumber=8170311","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:22:22Z","timestamp":1642004542000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8170311\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,1]]},"references-count":43,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tpds.2017.2781257","relation":{},"ISSN":["1045-9219"],"issn-type":[{"value":"1045-9219","type":"print"}],"subject":[],"published":{"date-parts":[[2018,4,1]]}}}