{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:04:48Z","timestamp":1758891888631,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,17]],"date-time":"2019-11-17T00:00:00Z","timestamp":1573948800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1563744"],"award-info":[{"award-number":["1563744"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,17]]},"DOI":"10.1145\/3295500.3356171","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T19:43:22Z","timestamp":1573155802000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Replication is more efficient than you think"],"prefix":"10.1145","author":[{"given":"Anne","family":"Benoit","sequence":"first","affiliation":[{"name":"Ecole Normale Superieure de Lyon, Lyon, France"}]},{"given":"Thomas","family":"Herault","sequence":"additional","affiliation":[{"name":"The University of Tennessee"}]},{"given":"Valentin Le","family":"F\u00e8vre","sequence":"additional","affiliation":[{"name":"Ecole Normale Superieure de Lyon, Lyon, France"}]},{"given":"Yves","family":"Robert","sequence":"additional","affiliation":[{"name":"The University of Tennessee"}]}],"member":"320","published-online":{"date-parts":[[2019,11,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1465482.1465560"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTER.2017.24"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063384.2063427"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2018.08.002"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2643660"},{"key":"e_1_3_2_1_6_1","volume-title":"INRIA","author":"Benoit A.","year":"2019","unstructured":"A. Benoit , T. Herault , V. L. F\u00e8vre , and Y. Robert . Replication is more efficient than you think. Research report RR-9278 , INRIA , 2019 . A. Benoit, T. Herault, V. L. F\u00e8vre, and Y. Robert. Replication is more efficient than you think. Research report RR-9278, INRIA, 2019."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.3366221"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-013-0331-3"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15646-5_22"},{"key":"e_1_3_2_1_10_1","volume-title":"Toward exascale resilience: 2014 update. Supercomputing frontiers and innovations, 1(1)","author":"Cappello F.","year":"2014","unstructured":"F. Cappello , A. Geist , W. Gropp , S. Kale , B. Kramer , and M. Snir . Toward exascale resilience: 2014 update. Supercomputing frontiers and innovations, 1(1) , 2014 . F. Cappello, A. Geist, W. Gropp, S. Kale, B. Kramer, and M. Snir. Toward exascale resilience: 2014 update. Supercomputing frontiers and innovations, 1(1), 2014."},{"key":"e_1_3_2_1_11_1","volume-title":"VeloC: very low overhead checkpointing system. https:\/\/veloc.readthedocs.io\/en\/latest\/, march","author":"Cappello F.","year":"2019","unstructured":"F. Cappello , K. Mohror , VeloC: very low overhead checkpointing system. https:\/\/veloc.readthedocs.io\/en\/latest\/, march 2019 . F. Cappello, K. Mohror, et al. VeloC: very low overhead checkpointing system. https:\/\/veloc.readthedocs.io\/en\/latest\/, march 2019."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.04.003"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMC-IT.2011.29"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1134241.1708449"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2014.122"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575356"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2012.56"},{"key":"e_1_3_2_1_18_1","volume-title":"PDCN. IASTED","author":"Engelmann C.","year":"2009","unstructured":"C. Engelmann , H. H. Ong , and S. L. Scorr . The case for modular redundancy in large-scale high performance computing systems . In PDCN. IASTED , 2009 . C. Engelmann, H. H. Ong, and S. L. Scorr. The case for modular redundancy in large-scale high performance computing systems. In PDCN. IASTED, 2009."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.2316\/P.2011.719-031"},{"key":"e_1_3_2_1_20_1","volume-title":"Evaluating the Viability of Process Replication Reliability for Exascale Systems. In SC'11","author":"Ferreira K.","year":"2011","unstructured":"K. Ferreira , J. Stearley , J. H. I. Laros , R. Oldfield , K. Pedretti , R. Brightwell , R. Riesen , P. G. Bridges , and D. Arnold . Evaluating the Viability of Process Replication Reliability for Exascale Systems. In SC'11 . ACM, 2011 . K. Ferreira, J. Stearley, J. H. I. Laros, R. Oldfield, K. Pedretti, R. Brightwell, R. Riesen, P. G. Bridges, and D. Arnold. Evaluating the Viability of Process Replication Reliability for Exascale Systems. In SC'11. ACM, 2011."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/0377-0427(93)E0258-N"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2012.04.018"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1007\/BFb0013477","volume-title":"Reliable Software Technologies --- Ada-Europe '96","author":"Guerraoui R.","year":"1996","unstructured":"R. Guerraoui and A. Schiper . Fault-tolerance by replication in distributed systems . In A. Strohmeier, editor, Reliable Software Technologies --- Ada-Europe '96 , pages 38 -- 57 , 1996 . R. Guerraoui and A. Schiper. Fault-tolerance by replication in distributed systems. In A. Strohmeier, editor, Reliable Software Technologies --- Ada-Europe '96, pages 38--57, 1996."},{"key":"e_1_3_2_1_24_1","volume-title":"Fault-Tolerance Techniques for High-Performance Computing, Computer Communications and Networks","author":"Herault T.","year":"2015","unstructured":"T. Herault and Y. Robert , editors . Fault-Tolerance Techniques for High-Performance Computing, Computer Communications and Networks . Springer Verlag , 2015 . T. Herault and Y. Robert, editors. Fault-Tolerance Techniques for High-Performance Computing, Computer Communications and Networks. Springer Verlag, 2015."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2018.00047"},{"key":"e_1_3_2_1_26_1","first-page":"398","volume-title":"IEEE International Symposium on","author":"Kondo D.","year":"2010","unstructured":"D. Kondo , B. Javadi , A. Iosup , and D. Epema . The failure trace archive: Enabling comparative analysis of failures in diverse distributed systems. Cluster Computing and the Grid , IEEE International Symposium on , pages 398 -- 407 , 2010 . D. Kondo, B. Javadi, A. Iosup, and D. Epema. The failure trace archive: Enabling comparative analysis of failures in diverse distributed systems. Cluster Computing and the Grid, IEEE International Symposium on, pages 398--407, 2010."},{"key":"e_1_3_2_1_27_1","volume-title":"https:\/\/www.usenix.org\/cfdr-data","author":"NL.","year":"2006","unstructured":"LA NL. Computer failure data repository. https:\/\/www.usenix.org\/cfdr-data , 2006 . LANL. Computer failure data repository. https:\/\/www.usenix.org\/cfdr-data, 2006."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03770-2_19"},{"key":"e_1_3_2_1_29_1","volume-title":"SC. ACM","author":"Moody A.","year":"2010","unstructured":"A. Moody , G. Bronevetsky , K. Mohror , and B. R. d. Supinski . Design, modeling , and evaluation of a scalable multi-level checkpointing system . In SC. ACM , 2010 . A. Moody, G. Bronevetsky, K. Mohror, and B. R. d. Supinski. Design, modeling, and evaluation of a scalable multi-level checkpointing system. In SC. ACM, 2010."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2503210.2503266"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTER.2012.82"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2007.4367962"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2008.4658655"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2010.5542625"},{"issue":"1","key":"e_1_3_2_1_35_1","volume":"78","author":"Schroeder B.","year":"2007","unstructured":"B. Schroeder and G. A. Gibson . Understanding Failures in Petascale Computers. Journal of Physics: Conference Series , 78 ( 1 ), 2007 . B. Schroeder and G. A. Gibson. Understanding Failures in Petascale Computers. Journal of Physics: Conference Series, 78(1), 2007.","journal-title":"Journal of Physics: Conference Series"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2012.6264669"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742854.2742903"},{"volume-title":"November","year":"2018","key":"e_1_3_2_1_38_1","unstructured":"Top500. Top 500 Supercomputer Sites , November 2018 . https:\/\/www.top500.org\/lists\/2018\/11\/. Top500. Top 500 Supercomputer Sites, November 2018. https:\/\/www.top500.org\/lists\/2018\/11\/."},{"key":"e_1_3_2_1_39_1","unstructured":"E. Weisstein. Gauss hypergeometric function. From MathWorld-A Wolfram Web Resource. http:\/\/functions.wolfram.com\/HypergeometricFunctions\/Hypergeometric2F1\/03\/04\/02\/.  E. Weisstein. Gauss hypergeometric function. From MathWorld-A Wolfram Web Resource. http:\/\/functions.wolfram.com\/HypergeometricFunctions\/Hypergeometric2F1\/03\/04\/02\/."},{"key":"e_1_3_2_1_40_1","unstructured":"E. Weisstein. Incomplete Beta Function. From MathWorld-A Wolfram Web Resource. http:\/\/mathworld.wolfram.com\/IncompleteBetaFunction.html.  E. Weisstein. Incomplete Beta Function. From MathWorld-A Wolfram Web Resource. http:\/\/mathworld.wolfram.com\/IncompleteBetaFunction.html."},{"key":"e_1_3_2_1_41_1","volume-title":"Using Replication and Checkpointing for Reliable Task Management in Computational Grids. In SC'10","author":"Yi S.","year":"2010","unstructured":"S. Yi , D. Kondo , B. Kim , G. Park , and Y. Cho . Using Replication and Checkpointing for Reliable Task Management in Computational Grids. In SC'10 . ACM, 2010 . S. Yi, D. Kondo, B. Kim, G. Park, and Y. Cho. Using Replication and Checkpointing for Reliable Task Management in Computational Grids. In SC'10. ACM, 2010."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/361147.361115"},{"key":"e_1_3_2_1_43_1","volume-title":"Thread-level redundancy fault tolerant CMP based on relaxed input replication","author":"Yu J.","year":"2011","unstructured":"J. Yu , D. Jian , Z. Wu , and H. Liu . Thread-level redundancy fault tolerant CMP based on relaxed input replication . In ICCIT. IEEE , 2011 . J. Yu, D. Jian, Z. Wu, and H. Liu. Thread-level redundancy fault tolerant CMP based on relaxed input replication. In ICCIT. IEEE, 2011."},{"key":"e_1_3_2_1_44_1","first-page":"93","volume-title":"Cluster Computing, 2004 IEEE International Conference on","author":"Zheng G.","year":"2004","unstructured":"G. Zheng , L. Shi , and L. V. Kale . FTC-Charm++: an in-memory checkpoint-based fault tolerant runtime for Charm++ and MPI . In Cluster Computing, 2004 IEEE International Conference on , pages 93 -- 103 . IEEE Computer Society , 2004 . G. Zheng, L. Shi, and L. V. Kale. FTC-Charm++: an in-memory checkpoint-based fault tolerant runtime for Charm++ and MPI. In Cluster Computing, 2004 IEEE International Conference on, pages 93--103. IEEE Computer Society, 2004."},{"key":"e_1_3_2_1_45_1","volume-title":"Cluster Computing","author":"Zheng Z.","year":"2009","unstructured":"Z. Zheng and Z. Lan . Reliability-aware scalability models for high performance computing . In Cluster Computing . IEEE , 2009 . Z. Zheng and Z. Lan. Reliability-aware scalability models for high performance computing. In Cluster Computing. IEEE, 2009."}],"event":{"name":"SC '19: The International Conference for High Performance Computing, Networking, Storage, and Analysis","sponsor":["SIGHPC ACM Special Interest Group on High Performance Computing, Special Interest Group on High Performance Computing","IEEE CS"],"location":"Denver Colorado","acronym":"SC '19"},"container-title":["Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3295500.3356171","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3295500.3356171","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3295500.3356171","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:13Z","timestamp":1750208533000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3295500.3356171"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,17]]},"references-count":45,"alternative-id":["10.1145\/3295500.3356171","10.1145\/3295500"],"URL":"https:\/\/doi.org\/10.1145\/3295500.3356171","relation":{},"subject":[],"published":{"date-parts":[[2019,11,17]]},"assertion":[{"value":"2019-11-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}