{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T02:45:06Z","timestamp":1767840306900,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,17]],"date-time":"2013-11-17T00:00:00Z","timestamp":1384646400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000015","name":"U.S. Department of Energy","doi-asserted-by":"publisher","award":["DOE DE-SC0001845"],"award-info":[{"award-number":["DOE DE-SC0001845"]}],"id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000105","name":"Office of Cyberinfrastructure","doi-asserted-by":"publisher","award":["OCI 07-25070"],"award-info":[{"award-number":["OCI 07-25070"]}],"id":[{"id":"10.13039\/100000105","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,17]]},"DOI":"10.1145\/2503210.2503266","type":"proceedings-article","created":{"date-parts":[[2013,10,30]],"date-time":"2013-10-30T12:55:22Z","timestamp":1383137722000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":46,"title":["ACR"],"prefix":"10.1145","author":[{"given":"Xiang","family":"Ni","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Esteban","family":"Meneses","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Nikhil","family":"Jain","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Laxmikant V.","family":"Kal\u00e9","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]}],"member":"320","published-online":{"date-parts":[[2013,11,17]]},"reference":[{"issue":"3","key":"e_1_3_2_1_1_1","first-page":"305","article-title":"Radiation-induced soft errors in advanced semiconductor technologies. Device and Materials Reliability","volume":"5","author":"Baumann R. C.","year":"2005","unstructured":"R. C. Baumann . Radiation-induced soft errors in advanced semiconductor technologies. Device and Materials Reliability , IEEE Transactions on , 5 ( 3 ): 305 -- 316 , 2005 . R. C. Baumann. Radiation-induced soft errors in advanced semiconductor technologies. Device and Materials Reliability, IEEE Transactions on, 5(3):305--316, 2005.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063384.2063427"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2008.12.002"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063384.2063428"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1177\/1094342009106189"},{"key":"e_1_3_2_1_6_1","first-page":"1","volume-title":"Supercomputing, SC '12","author":"Chung J.","year":"2012","unstructured":"J. Chung , I. Lee , M. Sullivan , J. H. Ryoo , D. W. Kim , D. H. Yoon , L. Kaplan , and M. Erez . Containment domains: a scalable, efficient, and flexible resilience scheme for exascale systems . In Supercomputing, SC '12 , pages 58: 1 -- 58 :11, Los Alamitos, CA , USA, 2012 . IEEE Computer Society Press . J. Chung, I. Lee, M. Sullivan, J. H. Ryoo, D. W. Kim, D. H. Yoon, L. Kaplan, and M. Erez. Containment domains: a scalable, efficient, and flexible resilience scheme for exascale systems. In Supercomputing, SC '12, pages 58:1--58:11, Los Alamitos, CA, USA, 2012. IEEE Computer Society Press."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2004.11.016"},{"key":"e_1_3_2_1_8_1","first-page":"189","volume-title":"The Case for Modular Redundancy in Large-Scale High Performance Computing Systems. In International Conference on Parallel and Distributed Computing and Networks (PDCN) 2009","author":"Engelmann C.","year":"2009","unstructured":"C. Engelmann , H. H. Ong , and S. L. Scott . The Case for Modular Redundancy in Large-Scale High Performance Computing Systems. In International Conference on Parallel and Distributed Computing and Networks (PDCN) 2009 , pages 189 -- 194 . ACTA Press, Calgary, AB, Canada , Feb. 2009 . C. Engelmann, H. H. Ong, and S. L. Scott. The Case for Modular Redundancy in Large-Scale High Performance Computing Systems. In International Conference on Parallel and Distributed Computing and Networks (PDCN) 2009, pages 189--194. ACTA Press, Calgary, AB, Canada, Feb. 2009."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736063"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063384.2063443"},{"key":"e_1_3_2_1_11_1","first-page":"1","volume-title":"Supercomputing, SC '12","author":"Fiala D.","year":"2012","unstructured":"D. Fiala , F. Mueller , C. Engelmann , R. Riesen , K. Ferreira , and R. Brightwell . Detection and correction of silent data corruption for large-scale high-performance computing . In Supercomputing, SC '12 , pages 78: 1 -- 78 :12, Los Alamitos, CA , USA, 2012 . IEEE Computer Society Press . D. Fiala, F. Mueller, C. Engelmann, R. Riesen, K. Ferreira, and R. Brightwell. Detection and correction of silent data corruption for large-scale high-performance computing. In Supercomputing, SC '12, pages 78:1--78:12, Los Alamitos, CA, USA, 2012. IEEE Computer Society Press."},{"key":"e_1_3_2_1_12_1","unstructured":"Fletcher checksum algorithm wiki page..  Fletcher checksum algorithm wiki page.."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11557265_37"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/46\/1\/067"},{"key":"e_1_3_2_1_15_1","volume-title":"Sandia National Laboratories","author":"Heroux M. A.","year":"2009","unstructured":"M. A. Heroux , D. W. Doerfler , P. S. Crozier , J. M. Willenbring , H. C. Edwards , A. Williams , M. Rajan , E. R. Keiter , H. K. Thornquist , and R. W. Numrich . Improving performance via mini-applications. Technical report , Sandia National Laboratories , September 2009 . M. A. Heroux, D. W. Doerfler, P. S. Crozier, J. M. Willenbring, H. C. Edwards, A. Williams, M. Rajan, E. R. Keiter, H. K. Thornquist, and R. W. Numrich. Improving performance via mini-applications. Technical report, Sandia National Laboratories, September 2009."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1122971.1122976"},{"key":"e_1_3_2_1_18_1","volume-title":"Exascale computing study: Technology challenges in achieving exascale systems","author":"Kogge P.","year":"2008","unstructured":"P. Kogge , K. Bergman , S. Borkar , D. Campbell , W. Carlson , W. Dally , M. Denneau , P. Franzon , W. Harrod , J. Hiller , S. Karp , S. Keckler , D. Klein , R. Lucas , M. Richards , A. Scarpelli , S. Scott , A. Snavely , T. Sterling , R. S. Williams , and K. Yelick . Exascale computing study: Technology challenges in achieving exascale systems , 2008 . P. Kogge, K. Bergman, S. Borkar, D. Campbell, W. Carlson, W. Dally, M. Denneau, P. Franzon, W. Harrod, J. Hiller, S. Karp, S. Keckler, D. Klein, R. Lucas, M. Richards, A. Scarpelli, S. Scott, A. Snavely, T. Sterling, R. S. Williams, and K. Yelick. Exascale computing study: Technology challenges in achieving exascale systems, 2008."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2010.03.003"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.936236"},{"key":"e_1_3_2_1_21_1","unstructured":"Lulesh. http:\/\/computation.llnl.gov\/casc\/ShockHydro\/.  Lulesh. http:\/\/computation.llnl.gov\/casc\/ShockHydro\/."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2012.6264673"},{"issue":"3","key":"e_1_3_2_1_23_1","first-page":"329","article-title":"Predicting the number of fatal soft errors in los alamos national laboratory's asc q supercomputer. Device and Materials Reliability","volume":"5","author":"Michalak S.","year":"2005","unstructured":"S. Michalak , K. Harris , N. Hengartner , B. Takala , and S. Wender . Predicting the number of fatal soft errors in los alamos national laboratory's asc q supercomputer. Device and Materials Reliability , IEEE Transactions on , 5 ( 3 ): 329 -- 335 , sept. 2005 . S. Michalak, K. Harris, N. Hengartner, B. Takala, and S. Wender. Predicting the number of fatal soft errors in los alamos national laboratory's asc q supercomputer. Device and Materials Reliability, IEEE Transactions on, 5(3):329--335, sept. 2005.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2010.18"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2005.37"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTER.2012.82"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1002\/jcc.20289"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2006.5"},{"key":"e_1_3_2_1_29_1","volume-title":"Sep.","author":"Vetter J.","year":"2009","unstructured":"J. Vetter . Hpc landscape application accelerators : Deus ex machina? Invited Talk at High Performance Embedded Computing Workshop , Sep. 2009 . J. Vetter. Hpc landscape application accelerators: Deus ex machina? Invited Talk at High Performance Embedded Computing Workshop, Sep. 2009."},{"key":"e_1_3_2_1_30_1","first-page":"93","volume-title":"2004 IEEE Cluster","author":"Zheng G.","year":"2004","unstructured":"G. Zheng , L. Shi , and L. V. Kal\u00e9 . FTC-Charm++: An In-Memory Checkpoint-Based Fault Tolerant Runtime for Charm++ and MPI . In 2004 IEEE Cluster , pages 93 -- 103 , San Diego, CA , September 2004 . G. Zheng, L. Shi, and L. V. Kal\u00e9. FTC-Charm++: An In-Memory Checkpoint-Based Fault Tolerant Runtime for Charm++ and MPI. In 2004 IEEE Cluster, pages 93--103, San Diego, CA, September 2004."}],"event":{"name":"SC13: International Conference for High Performance Computing, Networking, Storage and Analysis","location":"Denver Colorado","acronym":"SC13","sponsor":["SIGHPC ACM Special Interest Group on High Performance Computing, Special Interest Group on High Performance Computing","SIGARCH ACM Special Interest Group on Computer Architecture","IEEE-CS Computer Society"]},"container-title":["Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2503210.2503266","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2503210.2503266","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:21Z","timestamp":1750231701000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2503210.2503266"}},"subtitle":["automatic checkpoint\/restart for soft and hard error protection"],"short-title":[],"issued":{"date-parts":[[2013,11,17]]},"references-count":29,"alternative-id":["10.1145\/2503210.2503266","10.1145\/2503210"],"URL":"https:\/\/doi.org\/10.1145\/2503210.2503266","relation":{},"subject":[],"published":{"date-parts":[[2013,11,17]]},"assertion":[{"value":"2013-11-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}