{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T05:21:50Z","timestamp":1768540910005,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":79,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,11,24]],"date-time":"2015-11-24T00:00:00Z","timestamp":1448323200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,11,24]]},"DOI":"10.1145\/2814576.2814802","type":"proceedings-article","created":{"date-parts":[[2015,11,30]],"date-time":"2015-11-30T19:03:51Z","timestamp":1448910231000},"page":"197-209","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Speculative Memory Checkpointing"],"prefix":"10.1145","author":[{"given":"Dirk","family":"Vogt","sequence":"first","affiliation":[{"name":"Vrije Universiteit Amsterdam"}]},{"given":"Armando","family":"Miraglia","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam"}]},{"given":"Georgios","family":"Portokalidis","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology"}]},{"given":"Herbert","family":"Bos","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam"}]},{"given":"Andy","family":"Tanenbaum","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam"}]},{"given":"Cristiano","family":"Giuffrida","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam"}]}],"member":"320","published-online":{"date-parts":[[2015,11,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Apache benchmark (AB). http:\/\/httpd.apache.org\/docs\/2.0\/programs\/ab.html.  Apache benchmark (AB). http:\/\/httpd.apache.org\/docs\/2.0\/programs\/ab.html."},{"key":"e_1_3_2_1_2_1","unstructured":"BIND. http:\/\/www.isc.org\/downloads\/bind\/.  BIND. http:\/\/www.isc.org\/downloads\/bind\/."},{"key":"e_1_3_2_1_3_1","unstructured":"CRIU. http:\/\/criu.org.  CRIU. http:\/\/criu.org."},{"key":"e_1_3_2_1_4_1","unstructured":"Kernel Probes. http:\/\/www.kernel.org\/doc\/Documentation\/kprobes.txt.  Kernel Probes. http:\/\/www.kernel.org\/doc\/Documentation\/kprobes.txt."},{"key":"e_1_3_2_1_5_1","unstructured":"OpenVZ. http:\/\/wiki.openvz.org.  OpenVZ. http:\/\/wiki.openvz.org."},{"key":"e_1_3_2_1_6_1","unstructured":"SysBench. http:\/\/sysbench.sourceforge.net\/.  SysBench. http:\/\/sysbench.sourceforge.net\/."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1296907.1296914"},{"key":"e_1_3_2_1_8_1","first-page":"187","volume-title":"Proc. of the Third USENIX Conf. on File and Storage Technologies","author":"Bansal S.","year":"2004"},{"key":"e_1_3_2_1_9_1","first-page":"335","volume-title":"Proc. of the 10th USENIX Symp. on Operating Systems Design and Implementation","author":"Belay A.","year":"2012"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024421"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2490483.2490506"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/800216.806596"},{"key":"e_1_3_2_1_13_1","first-page":"95","volume-title":"Proc. of the 10th Int'l Conf. on Autonomic Computing","author":"Chiang J.-H."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/582787.822971"},{"key":"e_1_3_2_1_15_1","first-page":"273","volume-title":"Proc. of the Second Symp. on Networked Systems Design and Implementation","author":"Clark C.","year":"2005"},{"key":"e_1_3_2_1_16_1","first-page":"81","volume-title":"Proc. of the USENIX Annual Tech. Conf.","author":"Dieter W. R.","year":"2001"},{"key":"e_1_3_2_1_17_1","unstructured":"I. Doudalis and M. Prvulovic. KIMA: hybrid checkpointing for recovery from a wide range of errors and detection latencies. Technical report 2010.  I. Doudalis and M. Prvulovic. KIMA: hybrid checkpointing for recovery from a wide range of errors and detection latencies. Technical report 2010."},{"key":"e_1_3_2_1_18_1","unstructured":"C. Ferreira. Gene Expression Programming: Mathematical Modeling by an Artificial Intelligence. 2006.   C. Ferreira. Gene Expression Programming: Mathematical Modeling by an Artificial Intelligence. 2006."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2042476.2042507"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519083"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2005.76"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1924908.1924912"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663165.2663328"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/46\/1\/067"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066677.1067026"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993478.1993487"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1894122.1894151"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2012.45"},{"key":"e_1_3_2_1_29_1","first-page":"323","volume-title":"Proc. of the USENIX Annual Tech. Conf.","author":"Jiang S.","year":"2005"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168861"},{"key":"e_1_3_2_1_31_1","first-page":"19","volume-title":"Proc. of the Ninth USENIX Conf. on File and Stroage Technologies","author":"Joo Y.","year":"2011"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451168"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2013.69"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/1247360.1247361"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.969927"},{"key":"e_1_3_2_1_36_1","first-page":"159","volume-title":"Linux Symposium","author":"Laadan O.","year":"2010"},{"key":"e_1_3_2_1_37_1","first-page":"1","volume-title":"Proc. of the USENIX Annual Tech. Conf.","author":"Laadan O.","year":"2007"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508251"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1990.89337"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2011.12.004"},{"key":"e_1_3_2_1_42_1","first-page":"1","volume-title":"Proc. of the USENIX Annual Tech. Conf.","author":"Lu P.","year":"2007"},{"key":"e_1_3_2_1_43_1","first-page":"1","volume-title":"Xen Summit","author":"Magenheimer D.","year":"2008"},{"key":"e_1_3_2_1_44_1","first-page":"193","article-title":"Genetic algorithms, tournament selection, and the effects of noise","volume":"9","author":"Miller B. L.","year":"1995","journal-title":"Complex Systems"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"M. Mitchell. An introduction to genetic algorithms. MIT press 1998.   M. Mitchell. An introduction to genetic algorithms. MIT press 1998.","DOI":"10.7551\/mitpress\/3927.001.0001"},{"key":"e_1_3_2_1_46_1","first-page":"48","volume-title":"Proc. of the 27th Int'l Symp. on Fault-Tolerant Computing","author":"Nam H.-c.","year":"1997"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2013.14"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493123.2462918"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060323"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1952682.1952694"},{"key":"e_1_3_2_1_51_1","first-page":"18","volume-title":"Proc. of the USENIX Technical Conf.","author":"Plank J. S.","year":"1995"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.730527"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.5555\/2075658.2075661"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095833"},{"key":"e_1_3_2_1_55_1","first-page":"492","volume-title":"Proc. of Parallel and Distributed Processing Techniques and Applications","author":"Rieker M.","year":"2006"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1188455.1188619"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663165.2663325"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508250"},{"key":"e_1_3_2_1_59_1","first-page":"230","volume-title":"In Proc. of the Fourth Int'l Conf. on Genetic Algorithms","author":"Spears V. M.","year":"1991"},{"key":"e_1_3_2_1_60_1","first-page":"3","volume-title":"Proc. of the USENIX Annual Tech. Conf.","author":"Srinivasan S. M.","year":"2004"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993744.1993757"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294275"},{"key":"e_1_3_2_1_63_1","first-page":"69","volume-title":"13th Annual Linux Symposium","author":"Vasavada M.","year":"2011"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2524224.2524236"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.45"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060307"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2010.5560226"},{"key":"e_1_3_2_1_68_1","first-page":"22","volume-title":"Proc. of the 25th Int'l Symp. on Fault-Tolerant Computing","author":"Wang Y.-M.","year":"1995"},{"key":"e_1_3_2_1_69_1","first-page":"103","volume-title":"Proc. of the 7th Symp. on Operating Systems Design and Implementation","author":"Yang T.","year":"2006"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2421005"},{"key":"e_1_3_2_1_71_1","volume-title":"Proc. of First Int'l Conf. on Network and Electronics Engineering","author":"Zaw E. P.","year":"2011"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133956.1133979"},{"key":"e_1_3_2_1_73_1","first-page":"1","volume-title":"Proc. of the USENIX Annual Tech. Conf.","author":"Zhang I.","year":"2013"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/1952682.1952695"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519076"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28652-0_11"},{"key":"e_1_3_2_1_77_1","first-page":"17","volume-title":"Proc. of the USENIX Annual Tech. Conf.","author":"Zhao W.","year":"2011"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508293.1508297"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024415"}],"event":{"name":"Middleware '15: 16th International Middleware Conference","location":"Vancouver BC Canada","acronym":"Middleware '15","sponsor":["ACM Association for Computing Machinery","USENIX Assoc USENIX Assoc","IFIP International Federation for Information Processing"]},"container-title":["Proceedings of the 16th Annual Middleware Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2814576.2814802","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2814576.2814802","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:42Z","timestamp":1750225722000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2814576.2814802"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,24]]},"references-count":79,"alternative-id":["10.1145\/2814576.2814802","10.1145\/2814576"],"URL":"https:\/\/doi.org\/10.1145\/2814576.2814802","relation":{},"subject":[],"published":{"date-parts":[[2015,11,24]]},"assertion":[{"value":"2015-11-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}