{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T20:46:32Z","timestamp":1765485992808,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,31]],"date-time":"2016-05-31T00:00:00Z","timestamp":1464652800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,31]]},"DOI":"10.1145\/2909428.2909433","type":"proceedings-article","created":{"date-parts":[[2016,5,27]],"date-time":"2016-05-27T12:37:36Z","timestamp":1464352656000},"page":"43-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["In-Situ Mitigation of Silent Data Corruption in PDE Solvers"],"prefix":"10.1145","author":[{"given":"Maher","family":"Salloum","sequence":"first","affiliation":[{"name":"Sandia National Laboratories, Livermore, CA, USA"}]},{"given":"Jackson R.","family":"Mayo","sequence":"additional","affiliation":[{"name":"Sandia National Laboratories, Livermore, CA, USA"}]},{"given":"Robert C.","family":"Armstrong","sequence":"additional","affiliation":[{"name":"Sandia National Laboratories, Livermore, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,5,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","DOI":"10.2172\/1177404","volume-title":"Detecting silent data corruption for extreme-scale applications through data mining","author":"Bautista-Gomez L.","year":"2014","unstructured":"L. Bautista-Gomez and F. Cappello . Detecting silent data corruption for extreme-scale applications through data mining , 2014 . http:\/\/dx.doi.org\/10.2172\/1177404. 10.2172\/1177404 L. Bautista-Gomez and F. Cappello. Detecting silent data corruption for extreme-scale applications through data mining, 2014. http:\/\/dx.doi.org\/10.2172\/1177404."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2008.12.002"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.14529\/jsfi140101"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2014.123"},{"key":"e_1_3_2_1_5_1","volume-title":"A backward\/forward recovery approach for the preconditioned conjugate gradient method","author":"Fasi M.","year":"2015","unstructured":"M. Fasi , J. Langou , Y. Robert , and B. Ucar . A backward\/forward recovery approach for the preconditioned conjugate gradient method , 2015 . http:\/\/arxiv.org\/abs\/1511.04478. M. Fasi, J. Langou, Y. Robert, and B. Ucar. A backward\/forward recovery approach for the preconditioned conjugate gradient method, 2015. http:\/\/arxiv.org\/abs\/1511.04478."},{"key":"e_1_3_2_1_7_1","volume-title":"Salishan Conference on High-Speed Computing, 2015","author":"Hittinger J. A. F.","year":"2015","unstructured":"J. A. F. Hittinger and J. Loffeld . Bend but don't break: Prospects for resilience without recovery in algorithms for hyperbolic systems . Salishan Conference on High-Speed Computing, 2015 . http:\/\/www.lanl.gov\/conferences\/salishan\/salishan 2015 \/hittinger.pdf. J. A. F. Hittinger and J. Loffeld. Bend but don't break: Prospects for resilience without recovery in algorithms for hyperbolic systems. Salishan Conference on High-Speed Computing, 2015. http:\/\/www.lanl.gov\/conferences\/salishan\/salishan2015\/hittinger.pdf."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/355841.355847"},{"key":"e_1_3_2_1_9_1","volume-title":"SIAM Conference on Parallel Processing for Scientific Computing","author":"Ray J.","year":"2014","unstructured":"J. Ray , J. R. Mayo , and R. C. Armstrong . Finite difference stencils robust to silent data corruption . SIAM Conference on Parallel Processing for Scientific Computing , 2014 . https:\/\/www.pathlms.com\/siam\/courses\/477\/sections\/716. J. Ray, J. R. Mayo, and R. C. Armstrong. Finite difference stencils robust to silent data corruption. SIAM Conference on Parallel Processing for Scientific Computing, 2014. https:\/\/www.pathlms.com\/siam\/courses\/477\/sections\/716."},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. Seventh International Conference on Numerical Methods in Fluid Dynamics","author":"Roe P. L.","year":"1980","unstructured":"P. L. Roe . The use of the Riemann problem in finite difference schemes . In Proc. Seventh International Conference on Numerical Methods in Fluid Dynamics , 1980 . P. L. Roe. The use of the Riemann problem in finite difference schemes. In Proc. Seventh International Conference on Numerical Methods in Fluid Dynamics, 1980."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","DOI":"10.1137\/1.9780898718003","volume-title":"Iterative Methods for Sparse Linear Systems","author":"Saad Y.","year":"2003","unstructured":"Y. Saad . Iterative Methods for Sparse Linear Systems . SIAM , second edition, 2003 . Y. Saad. Iterative Methods for Sparse Linear Systems. SIAM, second edition, 2003."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2304576.2304588"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","DOI":"10.2172\/1184174","volume-title":"Detecting soft errors in stencil based computations","author":"Sharma V. C.","year":"2015","unstructured":"V. C. Sharma , G. Gopalakrishnan , and G. Bronevetsky . Detecting soft errors in stencil based computations , 2015 . https:\/\/e-reports-ext.llnl.gov\/pdf\/792530.pdf. V. C. Sharma, G. Gopalakrishnan, and G. Bronevetsky. Detecting soft errors in stencil based computations, 2015. https:\/\/e-reports-ext.llnl.gov\/pdf\/792530.pdf."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694348"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.05.505"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2581122.2544140"},{"key":"e_1_3_2_1_17_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1007\/978-3-319-27308-2_54","volume-title":"Euro-Par 2015: Parallel Processing Workshops","author":"Widener P.","year":"2015","unstructured":"P. Widener , K. Ferreira , S. Levy , and N. Fabian . Canaries in a coal mine: Using application-level checkpoints to detect memory failures . In Euro-Par 2015: Parallel Processing Workshops , Lecture Notes in Computer Science , volume 9523 , pages 669 -- 681 , 2015 . P. Widener, K. Ferreira, S. Levy, and N. Fabian. Canaries in a coal mine: Using application-level checkpoints to detect memory failures. In Euro-Par 2015: Parallel Processing Workshops, Lecture Notes in Computer Science, volume 9523, pages 669--681, 2015."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.proci.2010.06.147"}],"event":{"name":"HPDC'16: The 25th International Symposium on High-Performance Parallel and Distributed Computing","sponsor":["University of Arizona University of Arizona","SIGARCH ACM Special Interest Group on Computer Architecture","SIGHPC ACM Special Interest Group on High Performance Computing, Special Interest Group on High Performance Computing"],"location":"Kyoto Japan","acronym":"HPDC'16"},"container-title":["Proceedings of the ACM Workshop on Fault-Tolerance for HPC at Extreme Scale"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2909428.2909433","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2909428.2909433","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:56:13Z","timestamp":1750222573000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2909428.2909433"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,31]]},"references-count":17,"alternative-id":["10.1145\/2909428.2909433","10.1145\/2909428"],"URL":"https:\/\/doi.org\/10.1145\/2909428.2909433","relation":{},"subject":[],"published":{"date-parts":[[2016,5,31]]},"assertion":[{"value":"2016-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}