A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Affinity-aware checkpoint restart
2014
Proceedings of the 15th International Middleware Conference on - Middleware '14
This is due to a lack of page and core affinity awareness of the checkpoint/restart (C/R) mechanism, i.e., application tasks originally pinned to cores may be restarted on different cores, and in case ...
overheads instead of up to nearly four times longer an execution times without affinity-aware restarts on 16 cores. ...
Considering these two locality aspects, affinity awareness and checkpoint restart, performance suffers when an affinity sensitive application is checkpointed and later restarted using existing C/R techniques ...
doi:10.1145/2663165.2663325
dblp:conf/middleware/SainiRMHR14
fatcat:jky75rjnejgalivxz24444okiu
Assessing the Impact of ABFT and Checkpoint Composite Strategies
2014
2014 IEEE International Parallel & Distributed Processing Symposium Workshops
As a consequence, the only fault-tolerance approach that is currently used for these applications is checkpoint/restart. ...
of an iterative application composed of ABFT-aware and ABFTunaware sections. ...
When a failure occurs, the application is terminated, but can be later restarted from the last checkpoint. ...
doi:10.1109/ipdpsw.2014.79
dblp:conf/ipps/BosilcaBHRD14
fatcat:gu42hljhwfcelgclrnyniumv6m
Composing resilience techniques: ABFT, periodic and incremental checkpointing
2015
International Journal of Networking and Computing
As a consequence, the only practical fault-tolerance approach for these applications is checkpoint/restart. ...
In this paper we propose a model to investigate the efficiency of a composite protocol, that alternates between ABFT and checkpoint/restart for the effective protection of an iterative application composed ...
When a failure occurs, the application is terminated, but can later be restarted from the last checkpoint. ...
doi:10.15803/ijnc.5.1_2
fatcat:ft7yntxwvncghl5rbez24zcz4q
Preventing versus curing
2009
Proceedings of the 28th ACM symposium on Principles of distributed computing - PODC '09
We present Shrink, a scheduler that (a) bases its prediction on the access patterns of the past transactions from the same threads, and (b) uses a novel heuristic, which we call serialization affinity, ...
The OS scheduler in TxLinux is transaction aware, and makes scheduling decisions such that transactions waste minimal work. ...
As this scheme preserves wasted work before the checkpoint, it gains performance due to reduced aborts. ...
doi:10.1145/1582716.1582725
dblp:conf/podc/DragojevicGSS09
fatcat:rxuh6f7vubacdknp6m7gxt4hbm
Grid Resource Availability Prediction-Based Scheduling and Task Replication
2009
Journal of Grid Computing
The manner in which host resources become unavailable will have different effects on different jobs, depending on their runtime and their ability to be checkpointed or replicated. ...
A strategy that considers process checkpointability, job length, and predicted resource reliability does the best job of using additional replicated operations to reduce job makespan. ...
Tasks may use periodic checkpoints upon restart. Fujimoto et al. ...
doi:10.1007/s10723-009-9135-2
fatcat:ci5mrlg7lbhxnoqo4p6rap4zte
A systems perspective on GPU computing
2016
Proceedings of the 9th Annual Workshop on General Purpose Processing using Graphics Processing Unit - GPGPU '16
This makes it increasingly important for GPUs to have robust restart and checkpointing mechanisms. ...
Figure 6 depicts how affinity-aware work-stealing differs from classical work-stealing, when worker threads contend for chunks of work. ...
doi:10.1145/2884045.2884057
dblp:conf/ppopp/Farooqui16
fatcat:lcxhf6nfsvannnbp5lusxudmmu
Imaging of Cancer Immunotherapy: Current Approaches and Future Directions
2018
Radiology
Cancer immunotherapy using immune-checkpoint inhibitors has emerged as an effective treatment option for a variety of advanced cancers in the past decade. ...
Moreover, emerging data suggest a promise for molecular imaging that can visualize the specific target molecules involved in immune-checkpoint pathways. ...
However, it is also important to be aware that the incidence of pseudoprogression among patients treated with immune-checkpoint inhibitors is low (4, 17, 30) . ...
doi:10.1148/radiol.2018181349
pmid:30457485
pmcid:PMC6312436
fatcat:y4bt2x3ggjcc7kqcmznoyveznu
Neurological complications of immune checkpoint inhibitors: what happens when you 'take the brakes off' the immune system
2018
Therapeutic Advances in Neurological Disorders
The purpose of this review is to highlight the neurological complications associated with ICPIs; increase the awareness of the neurologists to Neurological complications of immune checkpoint inhibitors ...
inhibitors in patients with known immune diseases or restarting therapy after a neurological event. ...
Restarting ICPI treatment after a major immune event. The safety of retreatment with ICPI remains unsettled. ...
doi:10.1177/1756286418799864
pmid:30245744
pmcid:PMC6144585
fatcat:pgtcdo4jw5hrfjugqo4c44zsvq
Immuno-oncology: a narrative review of gastrointestinal and hepatic toxicities
2021
Annals of Translational Medicine
The most up-to-date knowledge on the regulation of the anti-cancer immune response has recently led to the development and approval of inhibitors of immune checkpoints, which have produced unprecedented ...
Currently approved checkpoint inhibitors block cytotoxic T-lymphocyte-associated antigen 4 (CTLA-4), programmed cell death protein (PD-1) and its ligand (PD-L1), resulted in increased survival of patients ...
When symptoms are resolved, the immunotherapy treatment can be restarted with dose modification (135) . ...
doi:10.21037/atm-20-7361
pmid:33842644
pmcid:PMC8033350
fatcat:jwljyu6twffcbmko6ioejm4mwy
A Cloud Native Platform for Stateful Streaming
[article]
2020
arXiv
pre-print
However, the podAntiAffinity spec is not symmetric: if pod A specifies anti-affinity to B, that does not require B to specify anti-affinity to A. ...
The consistent region controller coordinates application checkpoints and restarts for a single region. • ConsistentRegionOperator: tracks all consistent regions in a job. ...
arXiv:2006.00064v1
fatcat:fonovi3nwvgvvafqgroqtokqxm
Rewriting System for Profile-Guided Data Layout Transformations on Binaries
[chapter]
2017
Lecture Notes in Computer Science
Checkpoint/restart technique is used for this objective: Assuming the user knows the hotspot of the application, the original binary code is patched with a checkpoint right before the hotspot and then ...
For checkpoint/restart, we resort to the BLCR library [8] .
Automatic Mock-up Generation Technique Mock-ups are generated at compile time, as library functions. ...
doi:10.1007/978-3-319-64203-1_19
fatcat:qe6bzc2ixvcm5o5hpk2kmkrd5y
Algorithms and Scheduling Techniques for Exascale Systems (Dagstuhl Seminar 13381)
2014
Dagstuhl Reports
As a consequence, the only fault-tolerance approach that is currently used for these applications is checkpoint/restart. ...
Fault-tolerance is a major concern at large scale and several presentations focused on the limitations of current checkpoint-restart fault-tolerance techniques, providing analytical studies to quantify ...
These intervals dramatically complicate the analysis of the checkpointing strategies. ...
doi:10.4230/dagrep.3.9.106
dblp:journals/dagstuhl-reports/CasanovaRS13
fatcat:766ug56f5ndodox4ghazpljmei
Fault Tolerance Techniques for High-Performance Computing
[chapter]
2015
Computer Communications and Networks
We present the main two protocols, namely coordinated checkpointing and hierarchical checkpointing. Then we introduce performance models and use them to assess the performance of theses protocols. ...
The emphasis is on checkpointing, the de-facto standard technique for resilience in High Performance Computing. ...
need for a global restart. ...
doi:10.1007/978-3-319-20943-2_1
fatcat:2rehvmh6bvdsvbru6ukpcij6ae
"Requirement Analysis (Network And Storage) And Porting Roadmap", Exanest Project Deliverable D2.2
2017
Zenodo
Hence, as a general remark, underlying the general re-design of the code there must be a re-design of the GADGET's memory model in order to make it NUMA-aware or, in other words, to consider the affinity ...
If specified in the input, the execution could restart from a binary "restart file". ...
doi:10.5281/zenodo.802185
fatcat:3ov4t2an6fhl5psu7vgivtu2da
Scalable data management for map-reduce-based data-intensive applications: a view for cloud and hybrid infrastructures
2013
International Journal of Cloud Computing
To this end, we introduced BlobCR (BlobSeer-based Checkpoint-Restart) [22] , a checkpoint-restart framework specifically optimized for tightly-coupled scientific computations that were written using a ...
We propose a solution to this challenge that aims at minimizing the storage space and performance overhead of checkpoint-restart. ...
doi:10.1504/ijcc.2013.055265
fatcat:zgckseqpkzc5ne2x3a2yub7i34
« Previous
Showing results 1 — 15 out of 398 results