{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:47:14Z","timestamp":1750308434394,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":71,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,4]],"date-time":"2022-08-04T00:00:00Z","timestamp":1659571200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,4]]},"DOI":"10.1145\/3549206.3549328","type":"proceedings-article","created":{"date-parts":[[2022,10,24]],"date-time":"2022-10-24T19:26:28Z","timestamp":1666639588000},"page":"701-710","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Checkpointing \u00e0 la Young\/Daly: An Overview"],"prefix":"10.1145","author":[{"given":"Anne","family":"Benoit","sequence":"first","affiliation":[{"name":"LIP, ENS Lyon, France"}]},{"given":"Yishu","family":"Du","sequence":"additional","affiliation":[{"name":"LIP, ENS Lyon, France and Tongji Univ., China"}]},{"given":"Thomas","family":"Herault","sequence":"additional","affiliation":[{"name":"Univ. Tenn. Knoxville, USA"}]},{"given":"Loris","family":"Marchal","sequence":"additional","affiliation":[{"name":"LIP, ENS Lyon, France"}]},{"given":"Guillaume","family":"Pallez","sequence":"additional","affiliation":[{"name":"Inria Bordeaux, France"}]},{"given":"Lucas","family":"Perotin","sequence":"additional","affiliation":[{"name":"LIP, ENS Lyon, France"}]},{"given":"Yves","family":"Robert","sequence":"additional","affiliation":[{"name":"LIP, ENS Lyon, France and Univ. Tenn. Knoxville, USA"}]},{"given":"Hongyang","family":"Sun","sequence":"additional","affiliation":[{"name":"University of Kansas, USA"}]},{"given":"Frederic","family":"Vivien","sequence":"additional","affiliation":[{"name":"Inria &amp; LIP, ENS Lyon, France"}]}],"member":"320","published-online":{"date-parts":[[2022,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Analytical and Stochastic Modeling Techniques and Applications: 17th International Conference. Springer, 387\u2013399","author":"Arunagiri Sarala","year":"2010","unstructured":"Sarala Arunagiri , John\u00a0 T. Daly , and Patricia\u00a0 J. Teller . 2010 . Modeling and Analysis of Checkpoint I\/O Operations . In Analytical and Stochastic Modeling Techniques and Applications: 17th International Conference. Springer, 387\u2013399 . Sarala Arunagiri, John\u00a0T. Daly, and Patricia\u00a0J. Teller. 2010. Modeling and Analysis of Checkpoint I\/O Operations. In Analytical and Stochastic Modeling Techniques and Applications: 17th International Conference. Springer, 387\u2013399."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.15803\/ijnc.6.1_2"},{"key":"e_1_3_2_1_3_1","volume-title":"PMBS 2013, the 4th Int. Workshop on Performance Modeling, Benchmarking and Simulation of High Performance Computer Systems. LNCS Springer Verlag.","author":"Aupy Guillaume","year":"2013","unstructured":"Guillaume Aupy , Anne Benoit , Thomas H\u00e9rault , and Yves Robert . 2013 . Optimal checkpointing period: time vs. energy . In PMBS 2013, the 4th Int. Workshop on Performance Modeling, Benchmarking and Simulation of High Performance Computer Systems. LNCS Springer Verlag. Guillaume Aupy, Anne Benoit, Thomas H\u00e9rault, and Yves Robert. 2013. Optimal checkpointing period: time vs. energy. In PMBS 2013, the 4th Int. Workshop on Performance Modeling, Benchmarking and Simulation of High Performance Computer Systems. LNCS Springer Verlag."},{"unstructured":"Guillaume Aupy Yves Robert and Fr\u00e9d\u00e9ric Vivien. 2017. Assuming failure independence: are we right to be wrong?. In FTS\u20192017. Guillaume Aupy Yves Robert and Fr\u00e9d\u00e9ric Vivien. 2017. Assuming failure independence: are we right to be wrong?. In FTS\u20192017.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","first-page":"288","article-title":"Fault tolerance-challenges, techniques and implementation in cloud computing","volume":"9","author":"Bala Anju","year":"2012","unstructured":"Anju Bala and Inderveer Chana . 2012 . Fault tolerance-challenges, techniques and implementation in cloud computing . International Journal of Computer Science Issues (IJCSI) 9 , 1(2012), 288 . Anju Bala and Inderveer Chana. 2012. Fault tolerance-challenges, techniques and implementation in cloud computing. International Journal of Computer Science Issues (IJCSI) 9, 1(2012), 288.","journal-title":"International Journal of Computer Science Issues (IJCSI)"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1016\/j.jpdc.2016.07.007"},{"doi-asserted-by":"crossref","unstructured":"L. Bautista-Gomez A. Gainaru S. Perarnau D. Tiwari S. Gupta C. Engelmann F. Cappello and M. Snir. 2016. Reducing Waste in Extreme Scale Systems through Introspective Analysis. In IPDPS. IEEE 212\u2013221. L. Bautista-Gomez A. Gainaru S. Perarnau D. Tiwari S. Gupta C. Engelmann F. Cappello and M. Snir. 2016. Reducing Waste in Extreme Scale Systems through Introspective Analysis. In IPDPS. IEEE 212\u2013221.","key":"e_1_3_2_1_7_1","DOI":"10.1109\/IPDPS.2016.100"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/2063384.2063427"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/TC.2016.2643660"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/2897189"},{"unstructured":"Anne Benoit Lucas Perotin Yves Robert and Hongyang Sun. 2021. Checkpointing Workflows \u00e0 la Young\/Daly Is Not Good Enough. Research report RR-9413. INRIA. Available at https:\/\/hal.inria.fr\/hal-03264047\/. Anne Benoit Lucas Perotin Yves Robert and Hongyang Sun. 2021. Checkpointing Workflows \u00e0 la Young\/Daly Is Not Good Enough. Research report RR-9413. INRIA. Available at https:\/\/hal.inria.fr\/hal-03264047\/.","key":"e_1_3_2_1_11_1"},{"doi-asserted-by":"crossref","unstructured":"Anne Benoit Lucas Perotin Yves Robert and Fr\u00e9d\u00e9ric Vivien. 2022. Checkpointing strategies to protect parallel jobs from non-memoryless fail-stop errors. Research report RR-9465. INRIA. Available at https:\/\/hal.inria.fr\/hal-03610883. Anne Benoit Lucas Perotin Yves Robert and Fr\u00e9d\u00e9ric Vivien. 2022. Checkpointing strategies to protect parallel jobs from non-memoryless fail-stop errors. Research report RR-9465. INRIA. Available at https:\/\/hal.inria.fr\/hal-03610883.","key":"e_1_3_2_1_12_1","DOI":"10.1145\/3624560"},{"key":"e_1_3_2_1_13_1","volume-title":"Silent error detection in numerical time-stepping schemes.Int. J. High Performance Computing Applications","author":"Benson R.","year":"2014","unstructured":"Austin\u00a0 R. Benson , Sven Schmit , and Robert Schreiber . 2014. Silent error detection in numerical time-stepping schemes.Int. J. High Performance Computing Applications ( 2014 ). Austin\u00a0R. Benson, Sven Schmit, and Robert Schreiber. 2014. Silent error detection in numerical time-stepping schemes.Int. J. High Performance Computing Applications (2014)."},{"key":"e_1_3_2_1_14_1","first-page":"1971","article-title":"A Note on the Complexity of Network Reliability Problems","volume":"47","author":"Bodlaender L.","year":"2004","unstructured":"Hans\u00a0 L. Bodlaender and Thomas Wolle . 2004 . A Note on the Complexity of Network Reliability Problems . IEEE Trans. Inf. Theory 47 (2004), 1971 \u2013 1988 . Hans\u00a0L. Bodlaender and Thomas Wolle. 2004. A Note on the Complexity of Network Reliability Problems. IEEE Trans. Inf. Theory 47 (2004), 1971\u20131988.","journal-title":"IEEE Trans. Inf. Theory"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1016\/j.jpdc.2008.12.002"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/2063384.2063428"},{"doi-asserted-by":"crossref","unstructured":"Greg Bronevetsky and Bronis de Supinski. 2008. Soft error vulnerability of iterative linear algebra methods. In ICS. ACM. Greg Bronevetsky and Bronis de Supinski. 2008. Soft error vulnerability of iterative linear algebra methods. In ICS. ACM.","key":"e_1_3_2_1_17_1","DOI":"10.1145\/1375527.1375552"},{"key":"e_1_3_2_1_18_1","volume-title":"Toward Exascale Resilience: 2014 update. Supercomputing frontiers and innovations 1, 1","author":"Cappello Franck","year":"2014","unstructured":"Franck Cappello , Al Geist , William Gropp , Sanjay Kale , Bill Kramer , and Marc Snir . 2014. Toward Exascale Resilience: 2014 update. Supercomputing frontiers and innovations 1, 1 ( 2014 ). Franck Cappello, Al Geist, William Gropp, Sanjay Kale, Bill Kramer, and Marc Snir. 2014. Toward Exascale Resilience: 2014 update. Supercomputing frontiers and innovations 1, 1 (2014)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/214451.214456"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/2442516.2442533"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1016\/j.future.2004.11.016"},{"volume-title":"Optimization of multi-level checkpoint model for large scale HPC applications","author":"Di Sheng","unstructured":"Sheng Di , Mohamed\u00a0Slim Bouguerra , Leonardo Bautista-Gomez , and Franck Cappello . 2014. Optimization of multi-level checkpoint model for large scale HPC applications . In IPDPS. IEEE. Sheng Di, Mohamed\u00a0Slim Bouguerra, Leonardo Bautista-Gomez, and Franck Cappello. 2014. Optimization of multi-level checkpoint model for large scale HPC applications. In IPDPS. IEEE.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","volume-title":"Toward an Optimal Online Checkpoint Solution under a Two-Level HPC Checkpoint Model","author":"Di Sheng","year":"2016","unstructured":"Sheng Di , Yves Robert , Frederic Vivien , and Franck Cappello . 2016. Toward an Optimal Online Checkpoint Solution under a Two-Level HPC Checkpoint Model . IEEE Trans. Parallel & Distributed Systems( 2016 ). Sheng Di, Yves Robert, Frederic Vivien, and Franck Cappello. 2016. Toward an Optimal Online Checkpoint Solution under a Two-Level HPC Checkpoint Model. IEEE Trans. Parallel & Distributed Systems(2016)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1016\/j.ins.2017.01.035"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.15803\/ijnc.4.1_23"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1109\/TPDS.2021.3099440"},{"doi-asserted-by":"crossref","unstructured":"Nosayba El-Sayed and Bianca Schroeder. 2014. To checkpoint or not to checkpoint: Understanding energy-performance-I\/O tradeoffs in HPC checkpointing. In CLUSTER. 93\u2013102. Nosayba El-Sayed and Bianca Schroeder. 2014. To checkpoint or not to checkpoint: Understanding energy-performance-I\/O tradeoffs in HPC checkpointing. In CLUSTER. 93\u2013102.","key":"e_1_3_2_1_27_1","DOI":"10.1109\/CLUSTER.2014.6968778"},{"doi-asserted-by":"crossref","unstructured":"K. Ferreira J. Stearley J.\u00a0H.\u00a0III Laros R. Oldfield K. Pedretti R. Brightwell R. Riesen P.\u00a0G. Bridges and D. Arnold. 2011. Evaluating the Viability of Process Replication Reliability for Exascale Systems. In SC\u201911. ACM. K. Ferreira J. Stearley J.\u00a0H.\u00a0III Laros R. Oldfield K. Pedretti R. Brightwell R. Riesen P.\u00a0G. Bridges and D. Arnold. 2011. Evaluating the Viability of Process Replication Reliability for Exascale Systems. In SC\u201911. ACM.","key":"e_1_3_2_1_28_1","DOI":"10.1145\/2063384.2063443"},{"volume-title":"28th","author":"Gelenbe Erol","unstructured":"Erol Gelenbe , Pawel Boryszko , Miltiadis Siavvas , and Joanna Domanska . 2020. Optimum Checkpoints for Time and Energy . In 28th MASCOTS. IEEE , 1\u20138. Erol Gelenbe, Pawel Boryszko, Miltiadis Siavvas, and Joanna Domanska. 2020. Optimum Checkpoints for Time and Energy. In 28th MASCOTS. IEEE, 1\u20138.","key":"e_1_3_2_1_29_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1002\/net.3230180206"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1109\/TC.2018.2801300"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1145\/3225058.3225145"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1145\/2063384.2063444"},{"doi-asserted-by":"crossref","unstructured":"Thomas Herault and Yves Robert (Eds.). 2015. Fault-Tolerance Techniques for High-Performance Computing. Springer Verlag. Thomas Herault and Yves Robert (Eds.). 2015. Fault-Tolerance Techniques for High-Performance Computing. Springer Verlag.","key":"e_1_3_2_1_34_1","DOI":"10.1007\/978-3-319-20943-2"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.15803\/ijnc.9.1_28"},{"unstructured":"M.A. Heroux and M Hoemmen. 2011. Fault-tolerant iterative methods via selective reliability. Research report SAND2011-3915 C. Sandia Nat. Lab. M.A. Heroux and M Hoemmen. 2011. Fault-tolerant iterative methods via selective reliability. Research report SAND2011-3915 C. Sandia Nat. Lab.","key":"e_1_3_2_1_36_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1109\/TC.1984.1676475"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.1145\/2189750.2150989"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1109\/CCGRID.2008.79"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.1145\/1807128.1807160"},{"key":"e_1_3_2_1_41_1","volume-title":"A survey of fault tolerance in cloud computing","author":"Kumari Priti","year":"2018","unstructured":"Priti Kumari and Parmeet Kaur . 2018. A survey of fault tolerance in cloud computing . Journal of King Saud University - Computer and Information Sciences ( 2018 ). Priti Kumari and Parmeet Kaur. 2018. A survey of fault tolerance in cloud computing. Journal of King Saud University - Computer and Information Sciences (2018)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_42_1","DOI":"10.1145\/2465813.2465821"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_43_1","DOI":"10.1147\/rd.62.0200"},{"key":"e_1_3_2_1_44_1","volume-title":"\u00a0de Supinski","author":"Moody Adam","year":"2010","unstructured":"Adam Moody , Greg Bronevetsky , Kathryn Mohror , and Bronis R . \u00a0de Supinski . 2010 . Design, Modeling , and Evaluation of a Scalable Multi-level Checkpointing System. In SC. ACM. Adam Moody, Greg Bronevetsky, Kathryn Mohror, and Bronis R.\u00a0de Supinski. 2010. Design, Modeling, and Evaluation of a Scalable Multi-level Checkpointing System. In SC. ACM."},{"key":"e_1_3_2_1_45_1","volume-title":"\u00a0de Supinski","author":"Moody Adam","year":"2010","unstructured":"Adam Moody , Greg Bronevetsky , Kathryn Mohror , and Bronis R . \u00a0de Supinski . 2010 . Design, Modeling , and Evaluation of a Scalable Multi-level Checkpointing System. In Proc. SC\u2019 10. Adam Moody, Greg Bronevetsky, Kathryn Mohror, and Bronis R.\u00a0de Supinski. 2010. Design, Modeling, and Evaluation of a Scalable Multi-level Checkpointing System. In Proc. SC\u201910."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_46_1","DOI":"10.1109\/CLUSTER.2012.82"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_47_1","DOI":"10.1109\/16.278509"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_48_1","DOI":"10.1007\/978-3-319-26580-3"},{"volume-title":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT). 169\u2013172","author":"Prathiba Soma","unstructured":"Soma Prathiba and S. Sowvarnica . 2017. Survey of failures and fault tolerance in cloud . In 2017 2nd International Conference on Computing and Communications Technologies (ICCCT). 169\u2013172 . Soma Prathiba and S. Sowvarnica. 2017. Survey of failures and fault tolerance in cloud. In 2017 2nd International Conference on Computing and Communications Technologies (ICCCT). 169\u2013172.","key":"e_1_3_2_1_49_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_50_1","DOI":"10.1137\/0212053"},{"unstructured":"Piyush Sao and Richard Vuduc. 2013. Self-stabilizing Iterative Solvers. In ScalA \u201913. Piyush Sao and Richard Vuduc. 2013. Self-stabilizing Iterative Solvers. In ScalA \u201913.","key":"e_1_3_2_1_51_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_52_1","DOI":"10.1109\/DSN.2006.5"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_53_1","DOI":"10.1088\/1742-6596\/78\/1\/012022"},{"unstructured":"K. Schroiff P. Gemsjaeger and C. Bolik. 2006. Cascading failover of a data management application for shared disk file systems in loosely coupled node clusters. https:\/\/www.google.com\/patents\/US6990606 US Patent 6 990 606. K. Schroiff P. Gemsjaeger and C. Bolik. 2006. Cascading failover of a data management application for shared disk file systems in loosely coupled node clusters. https:\/\/www.google.com\/patents\/US6990606 US Patent 6 990 606.","key":"e_1_3_2_1_54_1"},{"doi-asserted-by":"crossref","unstructured":"Manu Shantharam Sowmyalatha Srinivasmurthy and Padma Raghavan. 2012. Fault Tolerant Preconditioned Conjugate Gradient for Sparse Linear System Solution. In ICS. ACM. Manu Shantharam Sowmyalatha Srinivasmurthy and Padma Raghavan. 2012. Fault Tolerant Preconditioned Conjugate Gradient for Sparse Linear System Solution. In ICS. ACM.","key":"e_1_3_2_1_55_1","DOI":"10.1145\/2304576.2304588"},{"key":"e_1_3_2_1_56_1","first-page":"315","article-title":"Realizing Best Checkpointing Control in Computing Systems","volume":"32","author":"Sigdel P.","year":"2021","unstructured":"P. Sigdel , X. Yuan , and N. Tzeng . 2021 . Realizing Best Checkpointing Control in Computing Systems . IEEE TPDS 32 , 2 (2021), 315 \u2013 329 . P. Sigdel, X. Yuan, and N. Tzeng. 2021. Realizing Best Checkpointing Control in Computing Systems. IEEE TPDS 32, 2 (2021), 315\u2013329.","journal-title":"IEEE TPDS"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_57_1","DOI":"10.1049\/ip-sen:19982440"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_58_1","DOI":"10.1177\/1094342014522573"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_59_1","DOI":"10.1145\/2694344.2694348"},{"volume-title":"Toward a General Theory of Optimal Checkpoint Placement","author":"Subasi Omer","unstructured":"Omer Subasi , Gokcen Kestor , and Sriram Krishnamoorthy . 2017. Toward a General Theory of Optimal Checkpoint Placement . In CLUSTER. IEEE , 464\u2013474. Omer Subasi, Gokcen Kestor, and Sriram Krishnamoorthy. 2017. Toward a General Theory of Optimal Checkpoint Placement. In CLUSTER. IEEE, 464\u2013474.","key":"e_1_3_2_1_60_1"},{"key":"e_1_3_2_1_61_1","first-page":"641","article-title":"Unified fault-tolerance framework for hybrid task-parallel message-passing applications","volume":"32","author":"Subasi Omer","year":"2018","unstructured":"Omer Subasi , Tatiana Martsinkevich , Ferad Zyulkyarov , Osman Unsal , Jesus Labarta , and Franck Cappello . 2018 . Unified fault-tolerance framework for hybrid task-parallel message-passing applications . IJHPCA 32 , 5 (2018), 641 \u2013 657 . Omer Subasi, Tatiana Martsinkevich, Ferad Zyulkyarov, Osman Unsal, Jesus Labarta, and Franck Cappello. 2018. Unified fault-tolerance framework for hybrid task-parallel message-passing applications. IJHPCA 32, 5 (2018), 641\u2013657.","journal-title":"IJHPCA"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_62_1","DOI":"10.1109\/DSN.2014.101"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_63_1","DOI":"10.1137\/0213039"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_64_1","DOI":"10.1137\/0208032"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_65_1","DOI":"10.1145\/2912152.2912155"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_66_1","DOI":"10.1109\/TII.2019.2959258"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_67_1","DOI":"10.1145\/361147.361115"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_68_1","DOI":"10.1109\/IPDPS.2012.122"},{"key":"e_1_3_2_1_69_1","volume-title":"Cluster Computing, 2004 IEEE International Conference on. IEEE Computer Society, 93\u2013103","author":"Zheng Gengbin","year":"2004","unstructured":"Gengbin Zheng , Lixia Shi , and L.\u00a0 V. Kale . 2004 . FTC-Charm++: an in-memory checkpoint-based fault tolerant runtime for Charm++ and MPI . In Cluster Computing, 2004 IEEE International Conference on. IEEE Computer Society, 93\u2013103 . Gengbin Zheng, Lixia Shi, and L.\u00a0V. Kale. 2004. FTC-Charm++: an in-memory checkpoint-based fault tolerant runtime for Charm++ and MPI. In Cluster Computing, 2004 IEEE International Conference on. IEEE Computer Society, 93\u2013103."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_70_1","DOI":"10.1109\/4.658626"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_71_1","DOI":"10.1147\/rd.401.0003"}],"event":{"acronym":"IC3-2022","name":"IC3-2022: 2022 Fourteenth International Conference on Contemporary Computing","location":"Noida India"},"container-title":["Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3549206.3549328","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3549206.3549328","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:51Z","timestamp":1750268991000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3549206.3549328"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,4]]},"references-count":71,"alternative-id":["10.1145\/3549206.3549328","10.1145\/3549206"],"URL":"https:\/\/doi.org\/10.1145\/3549206.3549328","relation":{},"subject":[],"published":{"date-parts":[[2022,8,4]]},"assertion":[{"value":"2022-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}