{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:15Z","timestamp":1750221255722,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,11]],"date-time":"2018-06-11T00:00:00Z","timestamp":1528675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,11]]},"DOI":"10.1145\/3208040.3208043","type":"proceedings-article","created":{"date-parts":[[2018,6,11]],"date-time":"2018-06-11T12:36:20Z","timestamp":1528720580000},"page":"156-167","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["LADR"],"prefix":"10.1145","author":[{"given":"Chao","family":"Chen","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology"}]},{"given":"Greg","family":"Eisenhauer","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]},{"given":"Matthew","family":"Wolf","sequence":"additional","affiliation":[{"name":"Oak Ridge National Lab"}]},{"given":"Santosh","family":"Pande","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2018,6,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Steve Ashby Pete Beckman Jackie Chen Phil Colella Bill Collins Dona Crawford Jack Dongarra Doug Kothe Rusty Lusk Paul Messina etal 2010. The opportunities and challenges of exascale computing.  Steve Ashby Pete Beckman Jackie Chen Phil Colella Bill Collins Dona Crawford Jack Dongarra Doug Kothe Rusty Lusk Paul Messina et al. 2010. The opportunities and challenges of exascale computing."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063384.2063427"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749246.2749253"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.18"},{"key":"e_1_3_2_1_5_1","unstructured":"Franck Cappello Al Geist B. Gropp L. Kale Bill Kramer and M. Snir. 2014. Toward Exascale Resilience:2014 Update. Technical Report.  Franck Cappello Al Geist B. Gropp L. Kale Bill Kramer and M. Snir. 2014. Toward Exascale Resilience:2014 Update. Technical Report."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1996130.1996142"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2442516.2442533"},{"volume-title":"Proceedings of International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation.","author":"Chen Z.","key":"e_1_3_2_1_8_1","unstructured":"Z. Chen , R. Inagaki , A. Nicolau , and A. V. Veidenbaum . 2015. Software fault tolerance for FPUs via vectorization . In Proceedings of International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation. Z. Chen, R. Inagaki, A. Nicolau, and A. V. Veidenbaum. 2015. Software fault tolerance for FPUs via vectorization. In Proceedings of International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2903150.2903170"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2014.65"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2014.53"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493123.2462920"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2517639"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1177\/1094342010391989"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145816.2145845"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2012.56"},{"volume-title":"The Case for Modular Redundancy in Large-Scale High Performance Computing Systems. In the IASTED International Conference.","author":"Engelmann Christian","key":"e_1_3_2_1_18_1","unstructured":"Christian Engelmann , Hong H. Ong , and Stephen L. Scott . 2009 . The Case for Modular Redundancy in Large-Scale High Performance Computing Systems. In the IASTED International Conference. Christian Engelmann, Hong H. Ong, and Stephen L. Scott. 2009. The Case for Modular Redundancy in Large-Scale High Performance Computing Systems. In the IASTED International Conference."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063384.2063443"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/859618.859631"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTER.2015.108"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38750-0_26"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901318.2901339"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/2388996.2389074"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346315"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2503210.2503266"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.980007"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126908.3126960"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2005.34"},{"volume-title":"Proceedings of International Symposium on Parallel and Distributed Processing. 730--739","author":"Di S.","key":"e_1_3_2_1_30_1","unstructured":"S. Di and F. Cappello . 2016. Fast Error-Bounded Lossy HPC Data Compression with SZ . In Proceedings of International Symposium on Parallel and Distributed Processing. 730--739 . S. Di and F. Cappello. 2016. Fast Error-Bounded Lossy HPC Data Compression with SZ. In Proceedings of International Symposium on Parallel and Distributed Processing. 730--739."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2014.55"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2011.36"}],"event":{"name":"HPDC '18: The 27th International Symposium on High-Performance Parallel and Distributed Computing","sponsor":["SIGHPC ACM Special Interest Group on High Performance Computing, Special Interest Group on High Performance Computing","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Tempe Arizona","acronym":"HPDC '18"},"container-title":["Proceedings of the 27th International Symposium on High-Performance Parallel and Distributed Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3208040.3208043","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3208040.3208043","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:08:06Z","timestamp":1750212486000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3208040.3208043"}},"subtitle":["low-cost application-level detector for reducing silent output corruptions"],"short-title":[],"issued":{"date-parts":[[2018,6,11]]},"references-count":32,"alternative-id":["10.1145\/3208040.3208043","10.1145\/3208040"],"URL":"https:\/\/doi.org\/10.1145\/3208040.3208043","relation":{},"subject":[],"published":{"date-parts":[[2018,6,11]]},"assertion":[{"value":"2018-06-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}