{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T16:46:55Z","timestamp":1765039615824,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":74,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T00:00:00Z","timestamp":1636761600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["CCF-1763540, CCF-1919044"],"award-info":[{"award-number":["CCF-1763540, CCF-1919044"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,14]]},"DOI":"10.1145\/3458817.3476144","type":"proceedings-article","created":{"date-parts":[[2021,11,24]],"date-time":"2021-11-24T14:42:14Z","timestamp":1637764934000},"page":"1-13","source":"Crossref","is-referenced-by-count":4,"title":["Pinpointing crash-consistency bugs in the HPC I\/O stack"],"prefix":"10.1145","author":[{"given":"Jinghan","family":"Sun","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Jian","family":"Huang","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Marc","family":"Snir","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"volume-title":"https:\/\/forum.hdfgroup.org\/t\/recover-a-corrupt-hdf5-file\/1146","year":"2008","author":"Recover","key":"e_1_3_2_1_1_1"},{"volume-title":"https:\/\/forum.hdfgroup.org\/t\/hdf5-file-state-in-case-of-crash\/1598","year":"2010","key":"e_1_3_2_1_2_1"},{"volume-title":"https:\/\/forum.hdfgroup.org\/t\/preventing-file-corruption-on-crash\/2462","year":"2012","author":"Preventing","key":"e_1_3_2_1_3_1"},{"volume-title":"https:\/\/forum.hdfgroup.org\/t\/recovering-from-power-loss-and-timeline-for-journaling\/3293","year":"2014","author":"Recovering","key":"e_1_3_2_1_4_1"},{"volume-title":"https:\/\/stackoverflow.com\/questions\/31287744\/corrupt-files-when-creating-hdf5-files-without-closing-them-h5py","year":"2015","author":"Corrupt","key":"e_1_3_2_1_5_1"},{"volume-title":"http:\/\/www.ece.iastate.edu\/~mai\/docs\/failures\/2016-hpcc-lustre.pdf","year":"2016","author":"Texas Tech HPCC","key":"e_1_3_2_1_6_1"},{"volume-title":"https:\/\/forum.hdfgroup.org\/t\/avoiding-corruption-of-the-hdf5-file\/4087","year":"2017","author":"Avoiding","key":"e_1_3_2_1_7_1"},{"volume-title":"an online file system checker for Lustre. https:\/\/github.com\/Xyratex\/lustre-stable\/blob\/master\/Documentation\/lfsck.txt","year":"2017","author":"FSCK","key":"e_1_3_2_1_8_1"},{"volume-title":"https:\/\/www.mankier.com\/1\/pvfs2-fsck","year":"2017","key":"e_1_3_2_1_9_1"},{"volume-title":"https:\/\/www.beegfs.io\/wiki\/FSCheck","year":"2018","author":"GFS","key":"e_1_3_2_1_10_1"},{"volume-title":"https:\/\/forum.hdfgroup.org\/t\/avoiding-a-corrupted-hdf5-file-or-be-able-to-recoverit\/5441","year":"2019","author":"Avoiding","key":"e_1_3_2_1_11_1"},{"volume-title":"https:\/\/www.unidata.ucar.edu\/support\/help\/MailArchives\/netcdf\/msg14595.html","year":"2019","author":"Recovering","key":"e_1_3_2_1_12_1"},{"volume-title":"suboptimal solver for the travelling salesman problem. https:\/\/pypi.org\/project\/tsp-solver2\/","year":"2020","author":"Greedy","key":"e_1_3_2_1_13_1"},{"volume-title":"https:\/\/man7.org\/linux\/man-pages\/man1\/strace.1.html","year":"2020","key":"e_1_3_2_1_14_1"},{"volume-title":"Proccedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI'16)","year":"2016","author":"Alagappan Ramnatthan","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2009.5161063"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30482-1_32"},{"volume-title":"Arpaci-Dusseau. Operating Systems: Three Easy Pieces","year":"2017","author":"Remzi","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1654059.1654081"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872406"},{"volume-title":"Los Alamos National Lab.(LANL)","year":"2012","author":"Boyer Eric B","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3205289.3205302"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132776"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815402"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522726"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/2208461.2208470"},{"key":"e_1_3_2_1_27_1","unstructured":"Avery Ching Kenin Coloma Jianwei Li Alok Choudhary and Wei keng Liao. High-performance techniques for parallel I\/O. http:\/\/users.eecs.northwestern.edu\/~choudhar\/Publications\/ChiCol07.pdf 2001.  Avery Ching Kenin Coloma Jianwei Li Alok Choudhary and Wei keng Liao. High-performance techniques for parallel I\/O. http:\/\/users.eecs.northwestern.edu\/~choudhar\/Publications\/ChiCol07.pdf 2001."},{"volume-title":"Proceedings of the Workshop on Input\/Output in Parallel and Distributed Systems (IPPS'95)","year":"1995","author":"Corbett Peter","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2019.00-20"},{"key":"e_1_3_2_1_30_1","first-page":"33","article-title":"Coverage-guided kernel fuzzing with Syzkaller","volume":"2","author":"Drysdale David","year":"2016","journal-title":"Linux Weekly News"},{"key":"e_1_3_2_1_31_1","first-page":"242","volume-title":"Working Conference on Verified Software: Theories, Tools, and Experiments","author":"Ernst Gidon","year":"2013"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966895.1966900"},{"volume-title":"Recon: Verifying file system consistency at runtime. ACM Transactions on Storage (TOS), 8(4):1--29","year":"2012","author":"Fryer Daniel","key":"e_1_3_2_1_33_1"},{"volume-title":"h5check: the hdf5 format checker. https:\/\/support.hdfgroup.org\/products\/hdf5_tools\/h5check.html","year":"2014","author":"The HDF Group","key":"e_1_3_2_1_34_1"},{"key":"e_1_3_2_1_35_1","unstructured":"The Open Group. POSIX.1-2008 IEEE Std 1003.1TM-2017 (Revision of IEEE Std 1003.1-2008) Base Specifications Issue 7. http:\/\/pubs.opengroup.org\/onlinepubs\/9699919799\/.  The Open Group. POSIX.1-2008 IEEE Std 1003.1 TM -2017 (Revision of IEEE Std 1003.1-2008) Base Specifications Issue 7. http:\/\/pubs.opengroup.org\/onlinepubs\/9699919799\/."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDSW51947.2020.00013"},{"key":"e_1_3_2_1_37_1","unstructured":"Jan Heichler. An introduction to BeeGFS. http:\/\/www.beegfs.de\/docs\/whitepapers\/Introduction_to_BeeGFS_by_ThinkParQ.pdf 2014.  Jan Heichler. An introduction to BeeGFS. http:\/\/www.beegfs.de\/docs\/whitepapers\/Introduction_to_BeeGFS_by_ThinkParQ.pdf 2014."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855511.1855515"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359662"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"e_1_3_2_1_41_1","first-page":"116","volume-title":"Proceedings.","author":"Meth Kalman Z","year":"2003"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815422"},{"key":"e_1_3_2_1_43_1","first-page":"33","volume-title":"Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI'18)","author":"Mohan Jayashree","year":"2018"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010215"},{"volume-title":"32nd European Conference on Object-Oriented Programming (ECOOP 2018","year":"2018","author":"Ntzik Gian","key":"e_1_3_2_1_45_1"},{"key":"e_1_3_2_1_46_1","first-page":"183","volume-title":"Margo I Seltzer. Berkeley DB. In USENIX Annual Technical Conference, FREENIX Track","author":"Olson Michael A","year":"1999"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855511.1855522"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2011.85"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46079-6_47"},{"volume-title":"Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI'14)","year":"2014","author":"Pillai Thanumalayan Sankaranarayana","key":"e_1_3_2_1_50_1"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2788401"},{"volume-title":"Proceedings of 2005 USENIX Annual Technical Conference (USENIX'05)","year":"2005","author":"Prabhakaran Vijayan","key":"e_1_3_2_1_52_1"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2014.25"},{"volume-title":"NetCDF: an interface for scientific data access","year":"1990","author":"Rew Russ","key":"e_1_3_2_1_54_1"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815411"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501620.2501623"},{"key":"e_1_3_2_1_57_1","volume-title":"FAST","volume":"2","author":"Schmuck Frank B","year":"2002"},{"key":"e_1_3_2_1_58_1","first-page":"380","volume-title":"Proceedings of the 2003 Linux symposium","volume":"2003","author":"Philip","year":"2003"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.5555\/3026877.3026879"},{"volume-title":"Proceedings of the 12th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage'20)","year":"2020","author":"Sun Jinghan","key":"e_1_3_2_1_60_1"},{"key":"e_1_3_2_1_61_1","unstructured":"OrangeFS Team. The OrangeFS project. http:\/\/www.orangefs.org\/ 2015.  OrangeFS Team. The OrangeFS project. http:\/\/www.orangefs.org\/ 2015."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855511.1855521"},{"volume-title":"The IEEE International Workshop on High-Performance Storage","year":"2020","author":"Wang Chen","key":"e_1_3_2_1_63_1"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2014.7004215"},{"volume-title":"Lawrence Livermore National Lab.(LLNL)","year":"2016","author":"Wang Teng","key":"e_1_3_2_1_65_1"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2015.83"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2004.22"},{"volume-title":"https:\/\/en.wikipedia.org\/wiki\/Parallel_I\/O","year":"2020","author":"Parallel","key":"e_1_3_2_1_68_1"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2003.1240573"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00035"},{"volume-title":"Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI'06)","year":"2006","author":"Yang Junfeng","key":"e_1_3_2_1_71_1"},{"volume-title":"Using model checking to find serious file system errors. ACM Transactions on Computer Systems (TOCS), 24(4):393--423","year":"2006","author":"Yang Junfeng","key":"e_1_3_2_1_72_1"},{"key":"e_1_3_2_1_73_1","first-page":"449","volume-title":"11th USENIX Symposium on Operating Systems Design and Implementation (OSDI'14)","author":"Zheng Mai","year":"2014"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2834976.2834984"}],"event":{"name":"SC '21: The International Conference for High Performance Computing, Networking, Storage and Analysis","sponsor":["SIGHPC ACM Special Interest Group on High Performance Computing, Special Interest Group on High Performance Computing","IEEE CS"],"location":"St. Louis Missouri","acronym":"SC '21"},"container-title":["Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3458817.3476144","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3458817.3476144","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3458817.3476144","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:06Z","timestamp":1750268946000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3458817.3476144"}},"subtitle":["a cross-layer approach"],"short-title":[],"issued":{"date-parts":[[2021,11,13]]},"references-count":74,"alternative-id":["10.1145\/3458817.3476144","10.1145\/3458817"],"URL":"https:\/\/doi.org\/10.1145\/3458817.3476144","relation":{},"subject":[],"published":{"date-parts":[[2021,11,13]]}}}