Filters








398 Hits in 2.6 sec

Affinity-aware checkpoint restart

Ajay Saini, Arash Rezaei, Frank Mueller, Paul Hargrove, Eric Roman
2014 Proceedings of the 15th International Middleware Conference on - Middleware '14  
This is due to a lack of page and core affinity awareness of the checkpoint/restart (C/R) mechanism, i.e., application tasks originally pinned to cores may be restarted on different cores, and in case  ...  overheads instead of up to nearly four times longer an execution times without affinity-aware restarts on 16 cores.  ...  Considering these two locality aspects, affinity awareness and checkpoint restart, performance suffers when an affinity sensitive application is checkpointed and later restarted using existing C/R techniques  ... 
doi:10.1145/2663165.2663325 dblp:conf/middleware/SainiRMHR14 fatcat:jky75rjnejgalivxz24444okiu

Assessing the Impact of ABFT and Checkpoint Composite Strategies

George Bosilca, Aurelien Bouteiller, Thomas Herault, Yves Robert, Jack Dongarra
2014 2014 IEEE International Parallel & Distributed Processing Symposium Workshops  
As a consequence, the only fault-tolerance approach that is currently used for these applications is checkpoint/restart.  ...  of an iterative application composed of ABFT-aware and ABFTunaware sections.  ...  When a failure occurs, the application is terminated, but can be later restarted from the last checkpoint.  ... 
doi:10.1109/ipdpsw.2014.79 dblp:conf/ipps/BosilcaBHRD14 fatcat:gu42hljhwfcelgclrnyniumv6m

Composing resilience techniques: ABFT, periodic and incremental checkpointing

George Bosilca, Aurelien Bouteiller, Thomas Herault, Yves Robert, Jack Dongarra
2015 International Journal of Networking and Computing  
As a consequence, the only practical fault-tolerance approach for these applications is checkpoint/restart.  ...  In this paper we propose a model to investigate the efficiency of a composite protocol, that alternates between ABFT and checkpoint/restart for the effective protection of an iterative application composed  ...  When a failure occurs, the application is terminated, but can later be restarted from the last checkpoint.  ... 
doi:10.15803/ijnc.5.1_2 fatcat:ft7yntxwvncghl5rbez24zcz4q

Preventing versus curing

Aleksandar Dragojević, Rachid Guerraoui, Anmol V. Singh, Vasu Singh
2009 Proceedings of the 28th ACM symposium on Principles of distributed computing - PODC '09  
We present Shrink, a scheduler that (a) bases its prediction on the access patterns of the past transactions from the same threads, and (b) uses a novel heuristic, which we call serialization affinity,  ...  The OS scheduler in TxLinux is transaction aware, and makes scheduling decisions such that transactions waste minimal work.  ...  As this scheme preserves wasted work before the checkpoint, it gains performance due to reduced aborts.  ... 
doi:10.1145/1582716.1582725 dblp:conf/podc/DragojevicGSS09 fatcat:rxuh6f7vubacdknp6m7gxt4hbm

Grid Resource Availability Prediction-Based Scheduling and Task Replication

Brent Rood, Michael J. Lewis
2009 Journal of Grid Computing  
The manner in which host resources become unavailable will have different effects on different jobs, depending on their runtime and their ability to be checkpointed or replicated.  ...  A strategy that considers process checkpointability, job length, and predicted resource reliability does the best job of using additional replicated operations to reduce job makespan.  ...  Tasks may use periodic checkpoints upon restart. Fujimoto et al.  ... 
doi:10.1007/s10723-009-9135-2 fatcat:ci5mrlg7lbhxnoqo4p6rap4zte

A systems perspective on GPU computing

Naila Farooqui
2016 Proceedings of the 9th Annual Workshop on General Purpose Processing using Graphics Processing Unit - GPGPU '16  
This makes it increasingly important for GPUs to have robust restart and checkpointing mechanisms.  ...  Figure 6 depicts how affinity-aware work-stealing differs from classical work-stealing, when worker threads contend for chunks of work.  ... 
doi:10.1145/2884045.2884057 dblp:conf/ppopp/Farooqui16 fatcat:lcxhf6nfsvannnbp5lusxudmmu

Imaging of Cancer Immunotherapy: Current Approaches and Future Directions

Mizuki Nishino, Hiroto Hatabu, F Stephen Hodi
2018 Radiology  
Cancer immunotherapy using immune-checkpoint inhibitors has emerged as an effective treatment option for a variety of advanced cancers in the past decade.  ...  Moreover, emerging data suggest a promise for molecular imaging that can visualize the specific target molecules involved in immune-checkpoint pathways.  ...  However, it is also important to be aware that the incidence of pseudoprogression among patients treated with immune-checkpoint inhibitors is low (4, 17, 30) .  ... 
doi:10.1148/radiol.2018181349 pmid:30457485 pmcid:PMC6312436 fatcat:y4bt2x3ggjcc7kqcmznoyveznu

Neurological complications of immune checkpoint inhibitors: what happens when you 'take the brakes off' the immune system

Marinos C. Dalakas
2018 Therapeutic Advances in Neurological Disorders  
The purpose of this review is to highlight the neurological complications associated with ICPIs; increase the awareness of the neurologists to Neurological complications of immune checkpoint inhibitors  ...  inhibitors in patients with known immune diseases or restarting therapy after a neurological event.  ...  Restarting ICPI treatment after a major immune event. The safety of retreatment with ICPI remains unsettled.  ... 
doi:10.1177/1756286418799864 pmid:30245744 pmcid:PMC6144585 fatcat:pgtcdo4jw5hrfjugqo4c44zsvq

Immuno-oncology: a narrative review of gastrointestinal and hepatic toxicities

Stergios Boussios, Matin Sheriff, Elie Rassy, Michele Moschetta, Eleftherios P. Samartzis, Rachel Hallit, Agne Sadauskaite, Konstantinos H. Katsanos, Dimitrios K. Christodoulou, Nicholas Pavlidis
2021 Annals of Translational Medicine  
The most up-to-date knowledge on the regulation of the anti-cancer immune response has recently led to the development and approval of inhibitors of immune checkpoints, which have produced unprecedented  ...  Currently approved checkpoint inhibitors block cytotoxic T-lymphocyte-associated antigen 4 (CTLA-4), programmed cell death protein (PD-1) and its ligand (PD-L1), resulted in increased survival of patients  ...  When symptoms are resolved, the immunotherapy treatment can be restarted with dose modification (135) .  ... 
doi:10.21037/atm-20-7361 pmid:33842644 pmcid:PMC8033350 fatcat:jwljyu6twffcbmko6ioejm4mwy

A Cloud Native Platform for Stateful Streaming [article]

Scott Schneider, Xavier Guerin, Shaohan Hu, Kun-Lung Wu
2020 arXiv   pre-print
However, the podAntiAffinity spec is not symmetric: if pod A specifies anti-affinity to B, that does not require B to specify anti-affinity to A.  ...  The consistent region controller coordinates application checkpoints and restarts for a single region. • ConsistentRegionOperator: tracks all consistent regions in a job.  ... 
arXiv:2006.00064v1 fatcat:fonovi3nwvgvvafqgroqtokqxm

Rewriting System for Profile-Guided Data Layout Transformations on Binaries [chapter]

Christopher Haine, Olivier Aumage, Denis Barthou
2017 Lecture Notes in Computer Science  
Checkpoint/restart technique is used for this objective: Assuming the user knows the hotspot of the application, the original binary code is patched with a checkpoint right before the hotspot and then  ...  For checkpoint/restart, we resort to the BLCR library [8] . Automatic Mock-up Generation Technique Mock-ups are generated at compile time, as library functions.  ... 
doi:10.1007/978-3-319-64203-1_19 fatcat:qe6bzc2ixvcm5o5hpk2kmkrd5y

Algorithms and Scheduling Techniques for Exascale Systems (Dagstuhl Seminar 13381)

Henri Casanova, Yves Robert, Uwe Schwiegelshohn, Marc Herbstritt
2014 Dagstuhl Reports  
As a consequence, the only fault-tolerance approach that is currently used for these applications is checkpoint/restart.  ...  Fault-tolerance is a major concern at large scale and several presentations focused on the limitations of current checkpoint-restart fault-tolerance techniques, providing analytical studies to quantify  ...  These intervals dramatically complicate the analysis of the checkpointing strategies.  ... 
doi:10.4230/dagrep.3.9.106 dblp:journals/dagstuhl-reports/CasanovaRS13 fatcat:766ug56f5ndodox4ghazpljmei

Fault Tolerance Techniques for High-Performance Computing [chapter]

Jack Dongarra, Thomas Herault, Yves Robert
2015 Computer Communications and Networks  
We present the main two protocols, namely coordinated checkpointing and hierarchical checkpointing. Then we introduce performance models and use them to assess the performance of theses protocols.  ...  The emphasis is on checkpointing, the de-facto standard technique for resilience in High Performance Computing.  ...  need for a global restart.  ... 
doi:10.1007/978-3-319-20943-2_1 fatcat:2rehvmh6bvdsvbru6ukpcij6ae

"Requirement Analysis (Network And Storage) And Porting Roadmap", Exanest Project Deliverable D2.2

ExaNeSt Consortium
2017 Zenodo  
Hence, as a general remark, underlying the general re-design of the code there must be a re-design of the GADGET's memory model in order to make it NUMA-aware or, in other words, to consider the affinity  ...  If specified in the input, the execution could restart from a binary "restart file".  ... 
doi:10.5281/zenodo.802185 fatcat:3ov4t2an6fhl5psu7vgivtu2da

Scalable data management for map-reduce-based data-intensive applications: a view for cloud and hybrid infrastructures

Gabriel Antoniu, Alexandru Costan, Julien Bigot, Frédéric Desprez, Gilles Fedak, Sylvain Gault, Christian Pérez, Anthony Simonet, Bing Tang, Christophe Blanchet, Raphael Terreux, Luc Bougé (+5 others)
2013 International Journal of Cloud Computing  
To this end, we introduced BlobCR (BlobSeer-based Checkpoint-Restart) [22] , a checkpoint-restart framework specifically optimized for tightly-coupled scientific computations that were written using a  ...  We propose a solution to this challenge that aims at minimizing the storage space and performance overhead of checkpoint-restart.  ... 
doi:10.1504/ijcc.2013.055265 fatcat:zgckseqpkzc5ne2x3a2yub7i34
« Previous Showing results 1 — 15 out of 398 results