{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:19Z","timestamp":1750221019454,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":13,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1145\/3335484.3335487","type":"proceedings-article","created":{"date-parts":[[2019,7,8]],"date-time":"2019-07-08T16:54:49Z","timestamp":1562604889000},"page":"253-259","source":"Crossref","is-referenced-by-count":1,"title":["Multi-level Container Checkpoint Performance Optimization Strategy in SDDC"],"prefix":"10.1145","author":[{"given":"Hanlin","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer and Electronic Information, Guangxi University, Nanning, China"}]},{"given":"Ningjiang","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer and Electronic Information, Guangxi University, Nanning, China"}]},{"given":"Yusi","family":"Tang","sequence":"additional","affiliation":[{"name":"School of Computer and Electronic Information, Guangxi University, Nanning, China"}]},{"given":"Birui","family":"Liang","sequence":"additional","affiliation":[{"name":"School of Computer and Electronic Information, Guangxi University, Nanning, China"}]}],"member":"320","reference":[{"key":"key-10.1145\/3335484.3335487-1","doi-asserted-by":"crossref","unstructured":"Karakus, M., Karakus, M., and Durresi, A. 2017. A survey: Control plane scalability issues and approaches in Software- Defined Networking (SDN). Comput. Net. 112(Jan. 2017), 279--293. DOI=https:\/\/doi.org\/10.1016\/j.comnet.2016.11.017","DOI":"10.1016\/j.comnet.2016.11.017"},{"key":"key-10.1145\/3335484.3335487-2","doi-asserted-by":"crossref","unstructured":"Darabseh, A., Alayyoub, M., and Jararweh, Y. 2015. SDS- torage: A Software Defined Storage Experimental Frame- work. In Proceedings of 2015 IEEE International Conference on Cloud Engineering (Tempe, AZ, March 9-13, 2015). IC2E '15. IEEE, New York, NY, 123--128. DOI=.https:\/\/doi.org\/10.1109\/IC2E.2015.6.","DOI":"10.1109\/IC2E.2015.6"},{"key":"key-10.1145\/3335484.3335487-3","doi-asserted-by":"crossref","unstructured":"Darabseh, A., Al-Ayyoub, M., Jararweh, Y., Benkhelifa, E., Vouk, M., and Rindos, A. 2015. SDDC: A Software Defined Datacenter Experimental Framework. In Proceedings of 2015 3rd International Conference on Future Internet of Things and Cloud (Rome, Italy, Aug 24-26, 2015). FiCloud'15. IEEE Computer Society, New York, NY, 189--194. DOI=https:\/\/doi.org\/10.1109\/FiCloud.2015.127","DOI":"10.1109\/FiCloud.2015.127"},{"key":"key-10.1145\/3335484.3335487-4","unstructured":"Zhang, R., Wei, D., and Zhu, M Y. 2017. Using Deep Neural Networks to Automate Large Scale Statistical Analysis for Big Data Applications. arXiv:1708.03027. Retrieved from https:\/\/arxiv.org\/abs\/1708.03027."},{"key":"key-10.1145\/3335484.3335487-5","doi-asserted-by":"crossref","unstructured":"G&#252;ler, B., and &#214;zkasap, &#214;. 2017. Efficient incremental checkpoint algorithm for primary-backup replication. In Proceedings of 25th Signal Processing and Communications Applications Conference (Antalya, Turkey, May 15-18, 2017). SIU'17. IEEE, New York, NY, 1--4. DOI=https:\/\/doi.org\/10.1109\/SIU.2017.7960709","DOI":"10.1109\/SIU.2017.7960709"},{"key":"key-10.1145\/3335484.3335487-6","doi-asserted-by":"crossref","unstructured":"Takizawa, H., Amrizal, M. A., Komatsu, K., and Egawa, R. 2017. An Application-Level Incremental Checkpointing Mechanism with Automatic Parameter Tuning. In Proceeding of 2017 Fifth International Symposium on Computing and Networking (Aomori, Japan, Nov 19-22, 2017). CANDAR'17. IEEE, New York, NY, 389--394. DOI=https:\/\/doi.org\/10.1109\/CANDAR.2017.96","DOI":"10.1109\/CANDAR.2017.96"},{"key":"key-10.1145\/3335484.3335487-7","unstructured":"Amrizal, M. A., and Takizawa, H. 2017. Optimizing Energy Consumption on HPC Systems with a Multi-Level Checkpointing Mechanism. In Proceedings of 2017 International Conference on Networking, Architecture, and Storage (Shenzhen, China, Aug 07-09, 2017). NAS'17. IEEE, New York, NY, 1612--1617. DOI=http:\/\/doi.org\/ 10.1109\/NAS.2017.8026868."},{"key":"key-10.1145\/3335484.3335487-8","doi-asserted-by":"crossref","unstructured":"Purushottam, S., and Nian-Feng, T. 2018. Coalescing and deduplicating incremental checkpoint files for restore-express multi-level checkpointing. IEEE Trans. on Paral. and Distr. Syst. 13(Dec. 2018), 2713--2727. DOI= http:\/\/doi.org\/10.1109\/TPDS.2018.2844210.","DOI":"10.1109\/TPDS.2018.2844210"},{"key":"key-10.1145\/3335484.3335487-9","doi-asserted-by":"crossref","unstructured":"Oliveira, E. M. D., and Oliveira, F. L. C. 2018. Forecasting mid-long term electric energy consumption through bagging arima and exponential smoothing methods. Energy, 144(Feb. 2018), 776--788. DOI=http:\/\/doi.org\/10.1016\/j.energy.2017.12.049.","DOI":"10.1016\/j.energy.2017.12.049"},{"key":"key-10.1145\/3335484.3335487-10","doi-asserted-by":"crossref","unstructured":"Gopalasingham, A., Herculea, D. G., Chen, C. S., and Roullet, L. 2017. Virtualization of radio access network by Virtual Machine and Docker: Practice and performance analysis. In Proceeding of 2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (Lisbon, Portugal, May 08-12, 2017). IM'17. IEEE, New York, NY,1567-1572. DOI=http:\/\/doi.org\/ 10.23919\/INM.2017.7987358","DOI":"10.23919\/INM.2017.7987358"},{"key":"key-10.1145\/3335484.3335487-11","unstructured":"Mirkin, A., Kuznetsov,A., and Kolyshkin, K. 2008. Containers checkpointing and live migration. In Proceedings of the 2008 Ottawa Linux Symposium, Ottawa Linux Symposium, 1--8. DOI=http:\/\/doi.org\/10.1.1.522. 1829."},{"key":"key-10.1145\/3335484.3335487-12","doi-asserted-by":"crossref","unstructured":"Louati, T., Abbes, H., &#233;C&#233;rin, Christophe, and Jemni, M. 2017. Lxcloud-cr: towards linux containers distributed hash table based checkpoint-restart. Jour. Para. Distr. Comput. 111(Jan. 2018), 187--205. DOI=https:\/\/doi.org\/10.1016\/j.jpdc.2017.08.011","DOI":"10.1016\/j.jpdc.2017.08.011"},{"key":"key-10.1145\/3335484.3335487-13","doi-asserted-by":"crossref","unstructured":"Zhang, S., Chen N J., Zhang H., Xue Y., Huang R. 2018. A High-Performance Adaptive Strategy of Container Checkpoint Based on Pre-replication. In Proceedings of the 11th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (Melbourne, NSW, Dec 11-13, 2018), SpaCCS'18. 240--250. DOI=https:\/\/doi.org\/10.1007\/978-3-030-05345-1_20","DOI":"10.1007\/978-3-030-05345-1_20"}],"event":{"number":"4","sponsor":["Shenzhen University","Sun Yat-Sen University"],"acronym":"ICBDC 2019","name":"the 2019 4th International Conference","start":{"date-parts":[[2019,5,10]]},"location":"Guangzhou, China","end":{"date-parts":[[2019,5,12]]}},"container-title":["Proceedings of the 2019 4th International Conference on Big Data and Computing  - ICBDC 2019"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3335484.3335487","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3335487&ftid=2070097&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:19Z","timestamp":1750206379000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3335484.3335487"}},"subtitle":[],"proceedings-subject":"Big Data and Computing","short-title":[],"issued":{"date-parts":[[2019]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1145\/3335484.3335487","relation":{},"subject":[],"published":{"date-parts":[[2019]]}}}