Filters








101,607 Hits in 3.7 sec

Estimating Error-probability and its Application for Optimizing Roll-back Recovery with Checkpointing

Dimitar Nikolov, Urban Ingelsson, Virendra Singh, Erik Larsson
2010 2010 Fifth IEEE International Symposium on Electronic Design, Test & Applications  
In this paper, it is demonstrated that inaccurate estimates of the error probability lead to loss of performance in a well known fault tolerance technique, Rollback Recovery with checkpointing (RRC).  ...  Using a simulator tool that has been developed to enable experimentation, the proposed method is evaluated and the results show that the proposed method provides useful estimates of the error probability  ...  design time, it is different for different ICs, and it is not constant through the lifetime of an IC due to for example aging and the environment where the IC is to be used [1] [2] [3] [5] .  ... 
doi:10.1109/delta.2010.25 dblp:conf/delta/NikolovISL10 fatcat:rh5fbowjezfkbi74lsmtqenmku

Handoff Based Secure Checkpointing and Log Based Rollback Recovery for Mobile Hosts

Priyanka Dey
2012 International journal of network security and its applications  
The recovery scheme proposed here combines independent checkpointing and message logging.  ...  An efficient fault tolerant algorithm based on movement-based secure checkpointing and logging for mobile computing system is proposed here.  ...  During checkpointing, MH will first save the states and encrypt it and then save it in the stable storage .Then the handoff counter will initialized to zero.  ... 
doi:10.5121/ijnsa.2012.4503 fatcat:xzdtosplbffz3auo7x44tcll6e

1) The Role of Immune Checkpoint and Its Clinical Application for Cancer Therapy-a History of Nivolumab-

Yoshiko Iwai
2019 Nihon Naika Gakkai Zasshi  
doi:10.2169/naika.108.1766 fatcat:nltenwt5sff7djyza4ozbgoqma

Development and validation of a sensitive LC MS/MS method for the measurement of the checkpoint kinase 1 inhibitor prexasertib and its application in a cerebral microdialysis study

Bo Zhong, Anil Maharaj, Abigail Davis, Martine F. Roussel, Clinton F. Stewart
2018 Journal of Pharmaceutical and Biomedical Analysis  
Pools of blank mouse plasma at low and high concentrations of 3 ng/ml and 400 ng/ml were prepared and aliquoted.  ...  had both accuracy between 80-120% and precision less than 20%, and a signal/noise (S/N) ratio greater than 5.  ...  Acknowledgments Research reported in the publication was supported by a Cancer Center Support (CORE) Grant CA 21765, a grant from Eli Lilly, and the American Lebanese Syrian Associated Charities (ALSAC  ... 
doi:10.1016/j.jpba.2018.04.018 pmid:29698863 pmcid:PMC5984718 fatcat:is3bx6vwcbcr5pz3edmzgar3bm

Checkpointing and its applications

Yi-Min Wang, Yennun Huang, Kiem-Phong Vo, Pe-Yu Chung, C. Kintala
Twenty-Fifth International Symposium on Fault-Tolerant Computing. Digest of Papers  
This paper describes our experience with the implementation and applications of the Unix checkpointing library libckp, and identifies two concepts that have proven to be the key to making checkpointing  ...  First, including all persistent state, i.e., user files, as part of the process state that can be checkpointed and recovered provides a truly transparent and consistent rollback.  ...  It ran out of memory after 2 hours and 50 minutes, took a checkpoint before it exited and was then migrated to a Sparc 2 with 80 megabytes of swap space.  ... 
doi:10.1109/ftcs.1995.466999 dblp:conf/ftcs/WangHVCK95 fatcat:3v2c4kvkrnevbnw4voznt24rgq

Hiding Checkpoint Overhead in HPC Applications with a Semi-Blocking Algorithm

Xiang Ni, Esteban Meneses, Laxmikant V. Kale
2012 2012 IEEE International Conference on Cluster Computing  
One limitation of the blocking algorithm is that it saturates the network bandwidth at the time of checkpoint.  ...  The experimental results show a dramatic reduction in the checkpoint overhead for various applications.  ...  Its success comes from its simplicity: an application periodically saves its state and if one failure brings part of the system down, the application rolls back to the most recent checkpoint and restarts  ... 
doi:10.1109/cluster.2012.82 dblp:conf/cluster/NiMK12 fatcat:qoqzowdffjh7fe2ni2b5gdscvy

Application-Level Checkpointing Techniques for Parallel Programs [chapter]

John Paul Walters, Vipin Chaudhary
2006 Lecture Notes in Computer Science  
This survey will discuss the various techniques used in application-level checkpointing, with special attention being paid to techniques for checkpointing parallel and distributed applications.  ...  In its simplest form, checkpointing is the act of saving a program's computation state in a form external to the running program, e.g. the computation state is saved to a filesystem.  ...  Rather than exploiting application-level checkpointing for its fault-tolerance and loadbalancing characteristics, Szwed et al. describe its use in fast-forwarding applications towards architectural simulation  ... 
doi:10.1007/11951957_21 fatcat:2rutx6wt6bg5pcwgpda7bkqdd4

Checkpointing-based rollback recovery for parallel applications on the InteGrade grid middleware

Raphael Y. de Camargo, Andrei Goldchleger, Fabio Kon, Alfredo Goldman
2004 Proceedings of the 2nd workshop on Middleware for grid computing -  
In case of failure, the application is restarted from the last saved global checkpoint.  ...  A precompiler automatically instruments the source-code of a C/C++ application, adding code for saving and recovering application state. A failure detector monitors the application execution.  ...  Acknowledgements Ulisses Hayashida provided the sequence similarity application used in our experiments.  ... 
doi:10.1145/1028493.1028499 dblp:conf/middleware/CamargoGKG04 fatcat:t3qew54nujej3ow5py4fypplga

An Application-Assisted Checkpoint-Restart Mechanism for Java Applications

Diana Andreea Popescu, Eliana-Dina Tirsa, Mugurel Ionut Andreica, Valentin Cristea
2013 2013 IEEE 12th International Symposium on Parallel and Distributed Computing  
In this paper we present a novel applicationassisted checkpoint-restart mechanism for Java applications.  ...  The novelty of our system is that it allows different checkpoint periods for different data items. Our implementation makes full use of the Java Reflection API.  ...  The mechanism and its associated API were designed for Java applications (and, thus, our implementation is also Java-based).  ... 
doi:10.1109/ispdc.2013.33 dblp:conf/ispdc/PopescuTAC13 fatcat:fn4nyjparnbq7djlqqgivxpv24

The Architecture of the XtreemOS Grid Checkpointing Service [chapter]

John Mehnert-Spahn, Thomas Ropars, Michael Schoettner, Christine Morin
2009 Lecture Notes in Computer Science  
Checkpointing and restarting applications in a grid requires saving and restoring applications in a distributed heterogeneous environment.  ...  The latter may spawn millions of grid nodes using different system-specific checkpointers saving and restoring application and kernel data structures on a grid node.  ...  The current prototype supports checkpointing and restarting jobs using BCLR and Kerrighed kernel checkpointers.  ... 
doi:10.1007/978-3-642-03869-3_42 fatcat:n3ciu7huwrhzjok43mudcxvjky

CCNCheck: Enabling Checkpointed Distributed Applications in Content Centric Networks [article]

Nitinder Mohan, Pushpendra Singh
2015 arXiv   pre-print
We consider the problem of checkpointing a distributed application efficiently in Content Centric Networks so that it can withstand transient failures.  ...  We present CCNCheck, a system which enables a sender optimized way of checkpointing distributed applications in CCN's and provides an efficient mechanism for failure recovery in such applications.  ...  It is built on CCNx v0.8.2. b) Checkpoint Handler: It provides the checkpoint mechanism in CCN and is based on DMTCP. c) End-User Applications: These are applications to be run in a distributed environment  ... 
arXiv:1506.00391v1 fatcat:wwgoghpm4zhhdpt7pxtwnki5aa

A Migration Framework for Executing Parallel Programs in the Grid [chapter]

József Kovács, Péter Kacsuk
2004 Lecture Notes in Computer Science  
The paper describes a parallel program checkpointing mechanism and its potential application in Grid systems in order to migrate applications among Grid sites.  ...  Integration of the Grid migration framework and the Mercury Grid monitor results in an observable Grid execution environment where the performance monitoring and visualization of PVM applications are supported  ...  In our proposed solution it is done by a migration co-ordination module built into the application. It checkpoints, terminates and restarts processes belonging to the application.  ... 
doi:10.1007/978-3-540-28642-4_10 fatcat:z3ej6dhzyrd43h4noppq6ckdpu

Independent checkpointing in a heterogeneous grid environment

Eugen Feller, John Mehnert-Spahn, Michael Schoettner, Christine Morin
2012 Future generations computer systems  
In order to provide fault tolerance and migration for grid applications, it integrates a distributed grid-checkpointing service called XtreemGCP.  ...  The experimental results demonstrate the capability of the XtreemGCP service to integrate different checkpointing protocols and independently checkpoint a distributed application within a heterogeneous  ...  Therefore, we have measured the time it takes to checkpoint this application when it opens up 50 communications channels and sends 100 Byte packets periodically every five seconds.  ... 
doi:10.1016/j.future.2011.03.012 fatcat:itkdugmaifenpnf4gcnzhkgnfy

CLIP

Yuqun Chen, James S. Plank, Kai Li
1997 Proceedings of the 1997 ACM/IEEE conference on Supercomputing (CDROM) - Supercomputing '97  
It is publicly available to Paragon users at no cost. Conceptually, checkpointing a multicomputer is quite straightforward.  ...  Checkpointing is a useful technique for rollback recovery of parallel applications.  ...  We would like to thank the members of the Scalable I/O Initiative for providing us with the applications used in this study. Ronald D.  ... 
doi:10.1145/509593.509626 dblp:conf/sc/ChenLP97 fatcat:jwk2l5qggvgxbiu6yufswwbekq

HADAB: Enabling Fault Tolerance in Parallel Applications Running in Distributed Environments [chapter]

Vania Boccia, Luisa Carracciuolo, Giuliano Laccetti, Marco Lapegna, Valeria Mele
2012 Lecture Notes in Computer Science  
In particular we describe details about HADAB, a new hybrid checkpointing strategy, and its deployment in a meaningful case study: the PETSc Conjugate Gradient algortithm implementation.  ...  Here we focus on the design and the deployment of a checkpointing/migration system to enable fault tolerance in parallel applications running in distributed environments.  ...  data locally and sends them to the checkpoint processor 2. the checkpoint processor [10] calculates the bitwise-XOR of the received data and stores it on its local storage device.  ... 
doi:10.1007/978-3-642-31464-3_71 fatcat:3a3guwnzvbbcloi57qgmehzfza
« Previous Showing results 1 — 15 out of 101,607 results