{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T09:06:48Z","timestamp":1768208808194,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,12]],"date-time":"2023-11-12T00:00:00Z","timestamp":1699747200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,12]]},"DOI":"10.1145\/3624062.3624115","type":"proceedings-article","created":{"date-parts":[[2023,11,10]],"date-time":"2023-11-10T13:53:39Z","timestamp":1699624419000},"page":"467-476","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["When to checkpoint at the end of a fixed-length reservation?"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-9161-0101","authenticated-orcid":false,"given":"Quentin","family":"Barbut","sequence":"first","affiliation":[{"name":"ENS Lyon, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2910-3540","authenticated-orcid":false,"given":"Anne","family":"Benoit","sequence":"additional","affiliation":[{"name":"ENS Lyon, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6756-6189","authenticated-orcid":false,"given":"Thomas","family":"Herault","sequence":"additional","affiliation":[{"name":"University of Tennessee, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2361-055X","authenticated-orcid":false,"given":"Yves","family":"Robert","sequence":"additional","affiliation":[{"name":"ENS Lyon, France and University of Tennessee, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0663-6152","authenticated-orcid":false,"given":"Fr\u00e9d\u00e9ric","family":"Vivien","sequence":"additional","affiliation":[{"name":"INRIA, France"}]}],"member":"320","published-online":{"date-parts":[[2023,11,12]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1002\/nla.2059"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/212433.212471"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/7.845238"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1134241.1708449"},{"key":"e_1_3_2_2_5_1","volume-title":"Grid Resource Management","author":"Deelman Ewa","unstructured":"Ewa Deelman, James Blythe, Yolanda Gil, and Carl Kesselman. 2003. Workflow management in GriPhyN. In Grid Resource Management. Springer."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1137\/0720023"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.2307\/2002770"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11823285_115"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTR.2005.347051"},{"key":"e_1_3_2_2_10_1","series-title":"SIAM journal on scientific computing 14, 5","volume-title":"Variants of BICGSTAB for matrices with complex spectrum","author":"Gutknecht H","year":"1993","unstructured":"Martin\u00a0H Gutknecht. 1993. Variants of BICGSTAB for matrices with complex spectrum. SIAM journal on scientific computing 14, 5 (1993), 1020\u20131033."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTR.2009.5289125"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"Thomas Herault and Yves Robert (Eds.). 2015. Fault-Tolerance Techniques for High-Performance Computing. Springer Verlag.","DOI":"10.1007\/978-3-319-20943-2"},{"key":"e_1_3_2_2_13_1","volume-title":"14th International Conference on Automatic Planning and Scheduling (ICAPS 04)","author":"Kim Jihie","year":"2004","unstructured":"Jihie Kim, Yolanda Gil, and Marc Spraragen. 2004. A knowledge-based approach to interactive workflow composition. In 14th International Conference on Automatic Planning and Scheduling (ICAPS 04)."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/331532.331578"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1137\/040620394"},{"key":"e_1_3_2_2_16_1","volume-title":"Verification and validation in scientific computing","author":"Oberkampf L","unstructured":"William\u00a0L Oberkampf and Christopher\u00a0J Roy. 2010. Verification and validation in scientific computing. Cambridge University Press."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btg1031"},{"key":"e_1_3_2_2_18_1","volume-title":"A comprehensive framework for verification, validation, and uncertainty quantification in scientific computing. Computer methods in applied mechanics and engineering 200, 25-28","author":"Roy J","year":"2011","unstructured":"Christopher\u00a0J Roy and William\u00a0L Oberkampf. 2011. A comprehensive framework for verification, validation, and uncertainty quantification in scientific computing. Computer methods in applied mechanics and engineering 200, 25-28 (2011), 2131\u20132144."},{"key":"e_1_3_2_2_19_1","volume-title":"Iterative Methods for Sparse Linear Systems","author":"Saad Y.","unstructured":"Y. Saad. 2003. Iterative Methods for Sparse Linear Systems (2nd ed.). Society for Industrial and Applied Mathematics.","edition":"2"},{"key":"e_1_3_2_2_20_1","series-title":"SIAM Journal on scientific and statistical computing 7, 3","volume-title":"GMRES: A generalized minimal residual algorithm for solving nonsymmetric linear systems","author":"Saad Youcef","year":"1986","unstructured":"Youcef Saad and Martin\u00a0H Schultz. 1986. GMRES: A generalized minimal residual algorithm for solving nonsymmetric linear systems. SIAM Journal on scientific and statistical computing 7, 3 (1986), 856\u2013869."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.08.027"},{"key":"e_1_3_2_2_22_1","unstructured":"Divyansh Sharma. 2022. Application checkpointing. https:\/\/hevodata.com\/learn\/application-checkpointing\/."},{"key":"e_1_3_2_2_23_1","unstructured":"Wikipedia. 2023. Application checkpointing. https:\/\/en.wikipedia.org\/wiki\/Application_checkpointing."},{"key":"e_1_3_2_2_24_1","unstructured":"Wolfram Alpha. 2023. Mathematics. https:\/\/www.wolframalpha.com."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9947-1954-0059635-7"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/361147.361115"}],"event":{"name":"SC-W 2023: Workshops of The International Conference on High Performance Computing, Network, Storage, and Analysis","location":"Denver CO USA","acronym":"SC-W 2023"},"container-title":["Proceedings of the SC '23 Workshops of the International Conference on High Performance Computing, Network, Storage, and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3624062.3624115","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3624062.3624115","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T03:03:35Z","timestamp":1755745415000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3624062.3624115"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,12]]},"references-count":26,"alternative-id":["10.1145\/3624062.3624115","10.1145\/3624062"],"URL":"https:\/\/doi.org\/10.1145\/3624062.3624115","relation":{},"subject":[],"published":{"date-parts":[[2023,11,12]]},"assertion":[{"value":"2023-11-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}