166 Hits in 2.9 sec

Analyzing Mutable Checkpointing via Invariants [chapter]

Deepanker Aggarwal, Astrid Kiehn
2015 Lecture Notes in Computer Science  
We equip it with a concise formal model and analyze its operational behavior via an invariant characterizing the snapshot computation.  ...  The well-known coordinated snapshot algorithm of mutable checkpointing [7, 8, 9] is studied.  ...  We gave a concise specification of the operational behavior of mutable checkpointing, set up an invariant for the reachable states (Lemma 2) and utilized it for the correctness proof of the final snapshot  ... 
doi:10.1007/978-3-319-24644-4_12 fatcat:qy4zh53zcba2tph4wihqcfv3qy

Efficient fault-tolerance for iterative graph processing on distributed dataflow systems

Chen Xu, Markus Holzemer, Manohar Kaul, Volker Markl
2016 2016 IEEE 32nd International Conference on Data Engineering (ICDE)  
In contrast to the typical unblocking checkpointing approaches (i.e., managing checkpoints independently for immutable datasets), we inject the checkpoints of mutable datasets into the iterative dataflow  ...  Rather than writing checkpoints that block downstream operators, our mechanism writes checkpoints in an unblocking manner, without breaking pipelined tasks.  ...  In an iterative dataflow, the checkpoints can be written via the back channel as illustrated in Figure 3 .  ... 
doi:10.1109/icde.2016.7498275 dblp:conf/icde/XuHKM16 fatcat:rijk5wlvh5h6jdwchfh4uqlqtq

KI-Mon ARM: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object

Hojoon Lee, Hyungon Moon, Ingoo Heo, Daehee Jang, Jinsoo Jang, Kihwan Kim, Yunheung Paek, Brent Kang
2017 IEEE Transactions on Dependable and Secure Computing  
The existing external hardware-based approaches lack an event-triggered verification scheme for mutable kernel objects.  ...  We inserted checkpoints in the software components of KI-Mon and the snapshot-only monitor to analyze the CPU usage of the two monitoring mechanisms.  ...  Monitoring rules can be implemented using the KI-Mon API to monitor mutable kernel objects with invariants.  ... 
doi:10.1109/tdsc.2017.2679710 fatcat:hhbtwtvrrna3pizwhuoisx5gq4

Automatically Enforcing Fresh and Consistent Inputs in Intermittent Systems [article]

Milijana Surbatovich, Limin Jia, Brandon Lucia
2021 arXiv   pre-print
The analysis can assume no mutable globals, and that references are owned -there is only one copy of a mutable reference. These assumptions simplify taint analysis.  ...  Ocelot uses the annotations to analyze the code and infer atomic regions that ensure the constraints.  ...  Whichever type of context is currently set governs the behaviour on checkpoints, low power triggers, and reboots.  ... 
arXiv:2104.04616v1 fatcat:rwaxb5apgjaapbr7mjveablg5i

ATR-Chk1-APC/CCdh1-dependent stabilization of Cdc7-ASK (Dbf4) kinase is required for DNA lesion bypass under replication stress

M. Yamada, K. Watanabe, M. Mistrik, E. Vesela, I. Protivankova, N. Mailand, M. Lee, H. Masai, J. Lukas, J. Bartek
2013 Genes & Development  
Stalled DNA replication evoked stabilization of the Cdc7-ASK (Dbf4) complex in a manner dependent on ATR-Chk1-mediated checkpoint signaling and its interplay with the anaphase-promoting complex/cyclosome  ...  These findings define a novel mechanism that orchestrates replication checkpoint signaling and ubiquitin-proteasome machinery with the DNA damage bypass pathway to guard against replication collapse under  ...  (Right) U2OS cells were treated with 1 mM MMC, 2 mM CIS, or 1 mM CPT for 24 h; lysates were analyzed by immunoblotting. (B) Activation of the replication checkpoint pathway in MRC5 and HeLa cells.  ... 
doi:10.1101/gad.224568.113 pmid:24240236 pmcid:PMC3841735 fatcat:ahil4flj4jdqjftfjxgm3yebce

A Short-Term Advantage for Syngamy in the Origin of Eukaryotic Sex: Effects of Cell Fusion on Cell Cycle Duration and Other Effects Related to the Duration of the Cell Cycle—Relationship between Cell Growth Curve and the Optimal Size of the Species, and Circadian Cell Cycle in Photosynthetic Unicellular Organisms

J. M. Mancebo Quintana, S. Mancebo Quintana
2012 International Journal of Evolutionary Biology  
to the asexual cycle), and the majority of mergers would occur between cells of different sizes. (2) The easiest-to-evolve regulation of cell proliferation (sexual/asexual) would be by modifying the checkpoints  ...  ., the nucleus); biological efficiency of cell size-either a lognormal curve or a min-max range; random survival rate; symmetry random segregation; symmetry mutability; checkpoint mutability; other gene  ...  (v) Every gene has a complementary gene to control its mutability.  ... 
doi:10.1155/2012/746825 pmid:22666626 pmcid:PMC3361227 fatcat:chdj2rd6xnagldzg33wksn3xne

Data Provenance

Peter Buneman, Wang-Chiew Tan
2019 SIGMOD record  
We then take a step beyond invariant confluence and introduce a generalization of invariant confluence, called segmented invariant confluence, that allows us to replicate non-invariant confluent objects  ...  commit implementations in two ways: (1) it provides a semantic description of committed operations, of the form "all operations until time ti from session i"; and (2) it uses asynchronous incremental checkpointing  ...  Analyzing TPC-C with invariant confluence by manually extracting the inherent constraints enabled Bailis et al. to show that only two of the twelve TPC-C constraints are not invariant confluent, and  ... 
doi:10.1145/3316416.3316418 fatcat:u4lmbha4fjgajlc46r66ryh7vi

Verifiable functional purity in java

Matthew Finifter, Adrian Mettler, Naveen Sastry, David Wagner
2008 Proceedings of the 15th ACM conference on Computer and communications security - CCS '08  
Suppose we take periodic checkpoints of an application and log all its inputs.  ...  See Table 1 for the three applications we analyze. (We used the Eclipse Metrics Plugin [25] for all code metrics.)  ... 
doi:10.1145/1455770.1455793 dblp:conf/ccs/FinifterMSW08 fatcat:jcthk6a4pzgbhats3l6dxga35m


Ross Shaull, Liuba Shrira, Hao Xu
2008 Proceedings of the 2008 ACM SIGMOD international conference on Management of data - SIGMOD '08  
Because Skippy is written during database checkpoints, we ensure that each run is long enough to capture multiple checkpoints.  ...  Databases are often comprised of both mutable and immutable data.  ... 
doi:10.1145/1376616.1376681 dblp:conf/sigmod/ShaullSX08 fatcat:rhxeeg7msnbupaxwrokzuzgiaq

Addressing failures in exascale computing

Marc Snir, Robert W Wisniewski, Jacob A Abraham, Sarita V Adve, Saurabh Bagchi, Pavan Balaji, Jim Belak, Pradip Bose, Franck Cappello, Bill Carlson, Andrew A Chien, Paul Coteus (+16 others)
2014 The international journal of high performance computing applications  
The checkpoint is correct-errors that could corrupt the checkpointed state are detected before the checkpoint is committed. 4. Committed output data is correct (output is committed when it is read).  ...  The state of each application is checkpointed periodically; if the application fails, then it is restarted from the last checkpoint.  ...  The performance of global checkpoint/restart schemes has been analyzed by multiple authors [153, 30] . We recapitulate the analysis in Appendix B.  ... 
doi:10.1177/1094342014522573 fatcat:menonpmgdfflzamz2fsivevxqm

Dagstuhl seminar review

Bettina Kemme, André Schiper, G. Ramalingam, Marc Shapiro
2014 ACM SIGACT News  
The framework addresses the conflict-resolution techniques via data type specification and invariants via consistency axioms.  ...  A number of approaches and tools have been developed for reasoning about concurrentlyaccessed shared mutable data.  ... 
doi:10.1145/2596583.2596601 fatcat:cdnh5juczjggjnhyoozzpsgkjm

Distributed computing column 53

Jennifer L. Welch
2014 ACM SIGACT News  
The framework addresses the conflict-resolution techniques via data type specification and invariants via consistency axioms.  ...  A number of approaches and tools have been developed for reasoning about concurrentlyaccessed shared mutable data.  ... 
doi:10.1145/2596583.2596600 fatcat:lruhrujqvnccxdqj3tkbrhxeku

The Stratosphere platform for big data analytics

Alexander Alexandrov, Rico Bergmann, Stephan Ewen, Johann-Christoph Freytag, Fabian Hueske, Arvid Heise, Odej Kao, Marcus Leich, Ulf Leser, Volker Markl, Felix Naumann, Mathias Peters (+6 others)
2014 The VLDB journal  
Therefore, this transformation is an invariant group transformation as known from relational query optimization [20] .  ...  Conclusions and research outlook We presented Stratosphere, a deep software stack for analyzing Big Data.  ... 
doi:10.1007/s00778-014-0357-y fatcat:ficnpssbvjdatjs3gewa4jdd7m

Open Data Fabric: A Decentralized Data Exchange and Transformation Protocol With Complete Reproducibility and Provenance [article]

Sergii Mikhtoniuk, Ozge Nilay Yalcin
2021 arXiv   pre-print
Even if fully implemented, its value would be limited due to mutable nature of data in many modern data systems.  ...  Secondly, the declarative nature of the streaming transformations allows us to easily analyze the structure of queries.  ... 
arXiv:2111.06364v1 fatcat:r6p5d47atnh6ppp3mw45vndstm

Genome organization and three kinds of heritable changes: general description and stochastic factors (a review)

Michael, Golubovsky
2005 Frontiers in Bioscience  
Cell division control includes checkpoint functions that stop the cell cycle until after the DNA repair process has been completed.  ...  They control the level of mutability by modulating cell repair system activity (6, 7) . DNA sequence affects enzymes that copy, move, and repair DNA (10).  ... 
doi:10.2741/1531 pmid:15574372 fatcat:4tbokn5mcva6zbvppclozv2vbm
« Previous Showing results 1 — 15 out of 166 results