Conference paper Open Access

Optimum Checkpointing for Long-running Programs

Siavvas, Miltiadis; Gelenbe, Erol


JSON Export

{
  "files": [
    {
      "links": {
        "self": "https://zenodo.org/api/files/d383af59-9a9c-4ccb-bdb2-b80d3ab72ee0/CEISEE_2019____Checkpointing_Paper.pdf"
      }, 
      "checksum": "md5:694bbec0ae23ec117062135057f5feca", 
      "bucket": "d383af59-9a9c-4ccb-bdb2-b80d3ab72ee0", 
      "key": "CEISEE_2019____Checkpointing_Paper.pdf", 
      "type": "pdf", 
      "size": 669949
    }
  ], 
  "owners": [
    75254
  ], 
  "doi": "10.5281/zenodo.3379889", 
  "stats": {
    "version_unique_downloads": 49.0, 
    "unique_views": 67.0, 
    "views": 74.0, 
    "version_views": 74.0, 
    "unique_downloads": 49.0, 
    "version_unique_views": 67.0, 
    "volume": 35507297.0, 
    "version_downloads": 53.0, 
    "downloads": 53.0, 
    "version_volume": 35507297.0
  }, 
  "links": {
    "doi": "https://doi.org/10.5281/zenodo.3379889", 
    "conceptdoi": "https://doi.org/10.5281/zenodo.3379888", 
    "bucket": "https://zenodo.org/api/files/d383af59-9a9c-4ccb-bdb2-b80d3ab72ee0", 
    "conceptbadge": "https://zenodo.org/badge/doi/10.5281/zenodo.3379888.svg", 
    "html": "https://zenodo.org/record/3379889", 
    "latest_html": "https://zenodo.org/record/3379889", 
    "badge": "https://zenodo.org/badge/doi/10.5281/zenodo.3379889.svg", 
    "latest": "https://zenodo.org/api/records/3379889"
  }, 
  "conceptdoi": "10.5281/zenodo.3379888", 
  "created": "2019-08-28T11:47:58.828785+00:00", 
  "updated": "2020-01-20T16:45:40.743115+00:00", 
  "conceptrecid": "3379888", 
  "revision": 5, 
  "id": 3379889, 
  "metadata": {
    "access_right_category": "success", 
    "doi": "10.5281/zenodo.3379889", 
    "version": "1.0", 
    "language": "eng", 
    "title": "Optimum Checkpointing for Long-running Programs", 
    "license": {
      "id": "CC-BY-4.0"
    }, 
    "related_identifiers": [
      {
        "scheme": "doi", 
        "identifier": "10.5281/zenodo.3379888", 
        "relation": "isVersionOf"
      }
    ], 
    "relations": {
      "version": [
        {
          "count": 1, 
          "index": 0, 
          "parent": {
            "pid_type": "recid", 
            "pid_value": "3379888"
          }, 
          "is_last": true, 
          "last_child": {
            "pid_type": "recid", 
            "pid_value": "3379889"
          }
        }
      ]
    }, 
    "grants": [
      {
        "code": "780572", 
        "links": {
          "self": "https://zenodo.org/api/grants/10.13039/501100000780::780572"
        }, 
        "title": "Software Development toolKit for Energy optimization and technical Debt elimination", 
        "acronym": "SDK4ED", 
        "program": "H2020", 
        "funder": {
          "doi": "10.13039/501100000780", 
          "acronyms": [], 
          "name": "European Commission", 
          "links": {
            "self": "https://zenodo.org/api/funders/10.13039/501100000780"
          }
        }
      }
    ], 
    "keywords": [
      "software reliability", 
      "roll-back recovery", 
      "application-level checkpoints", 
      "optimum checkpoints", 
      "program loops"
    ], 
    "publication_date": "2019-08-28", 
    "creators": [
      {
        "orcid": "0000-0002-3251-8723", 
        "affiliation": "Imperial College London, London, United Kingdom", 
        "name": "Siavvas, Miltiadis"
      }, 
      {
        "affiliation": "Institute of Theoretical & Applied Informatics, Polish Academy of Sciences, Gliwice, Poland", 
        "name": "Gelenbe, Erol"
      }
    ], 
    "meeting": {
      "acronym": "CEISEE19", 
      "url": "http://ceisee.ceisee.com/", 
      "dates": "30-31 May 2019", 
      "place": "Lisbon - Caparica, Portugal", 
      "title": "15th China-Europe International Symposium on Software Engineering Education (CEISEE19)"
    }, 
    "access_right": "open", 
    "resource_type": {
      "subtype": "conferencepaper", 
      "type": "publication", 
      "title": "Conference paper"
    }, 
    "description": "<p>Checkpoints are widely used to improve the performance of computer systems and programs in the presence of failures, and significantly reduce the cost of restarting a program each time that it fails. Application level checkpointing has been proposed for programs which may execute on platforms which are prone to failures, and also to reduce the execution time of programs which are prone to internal failures. Thus we propose a mathematical model to estimate the average execution time of a program that operates in the presence of dependability failures, without and with application level checkpointing, and use it to estimate the optimum interval in number of instructions executed between successive checkpoints. Specific emphasis is given on programs with loops, whereas the results are illustrated through simulation.</p>"
  }
}
74
53
views
downloads
All versions This version
Views 7474
Downloads 5353
Data volume 35.5 MB35.5 MB
Unique views 6767
Unique downloads 4949

Share

Cite as