Conference paper Open Access

Optimum Interval for Application-level Checkpoints

Siavvas, Miltiadis; Gelenbe, Erol


JSON Export

{
  "files": [
    {
      "links": {
        "self": "https://zenodo.org/api/files/04f995d1-b814-480b-8fea-d2351371f483/PCSCloud__Optimum_Interval.pdf"
      }, 
      "checksum": "md5:fe22161de1e453f4c0fbaff9c94ed201", 
      "bucket": "04f995d1-b814-480b-8fea-d2351371f483", 
      "key": "PCSCloud__Optimum_Interval.pdf", 
      "type": "pdf", 
      "size": 454639
    }
  ], 
  "owners": [
    75254
  ], 
  "doi": "10.5281/zenodo.3381007", 
  "stats": {
    "version_unique_downloads": 68.0, 
    "unique_views": 39.0, 
    "views": 42.0, 
    "version_views": 42.0, 
    "unique_downloads": 68.0, 
    "version_unique_views": 39.0, 
    "volume": 31824730.0, 
    "version_downloads": 70.0, 
    "downloads": 70.0, 
    "version_volume": 31824730.0
  }, 
  "links": {
    "doi": "https://doi.org/10.5281/zenodo.3381007", 
    "conceptdoi": "https://doi.org/10.5281/zenodo.3381006", 
    "bucket": "https://zenodo.org/api/files/04f995d1-b814-480b-8fea-d2351371f483", 
    "conceptbadge": "https://zenodo.org/badge/doi/10.5281/zenodo.3381006.svg", 
    "html": "https://zenodo.org/record/3381007", 
    "latest_html": "https://zenodo.org/record/3381007", 
    "badge": "https://zenodo.org/badge/doi/10.5281/zenodo.3381007.svg", 
    "latest": "https://zenodo.org/api/records/3381007"
  }, 
  "conceptdoi": "10.5281/zenodo.3381006", 
  "created": "2019-08-29T07:15:16.941203+00:00", 
  "updated": "2020-01-20T12:55:13.686571+00:00", 
  "conceptrecid": "3381006", 
  "revision": 5, 
  "id": 3381007, 
  "metadata": {
    "access_right_category": "success", 
    "doi": "10.5281/zenodo.3381007", 
    "version": "1.0", 
    "language": "eng", 
    "title": "Optimum Interval for Application-level Checkpoints", 
    "license": {
      "id": "CC-BY-4.0"
    }, 
    "related_identifiers": [
      {
        "scheme": "doi", 
        "identifier": "10.5281/zenodo.3381006", 
        "relation": "isVersionOf"
      }
    ], 
    "relations": {
      "version": [
        {
          "count": 1, 
          "index": 0, 
          "parent": {
            "pid_type": "recid", 
            "pid_value": "3381006"
          }, 
          "is_last": true, 
          "last_child": {
            "pid_type": "recid", 
            "pid_value": "3381007"
          }
        }
      ]
    }, 
    "grants": [
      {
        "code": "780572", 
        "links": {
          "self": "https://zenodo.org/api/grants/10.13039/501100000780::780572"
        }, 
        "title": "Software Development toolKit for Energy optimization and technical Debt elimination", 
        "acronym": "SDK4ED", 
        "program": "H2020", 
        "funder": {
          "doi": "10.13039/501100000780", 
          "acronyms": [], 
          "name": "European Commission", 
          "links": {
            "self": "https://zenodo.org/api/funders/10.13039/501100000780"
          }
        }
      }
    ], 
    "keywords": [
      "Cloud Computing", 
      "Software Reliability", 
      "Roll- Back Recovery", 
      "Application Level Checkpoints", 
      "Optimum Checkpoints", 
      "Program Loops"
    ], 
    "publication_date": "2019-08-29", 
    "creators": [
      {
        "orcid": "0000-0002-3251-8723", 
        "affiliation": "Imperial College London, London, United Kingdom", 
        "name": "Siavvas, Miltiadis"
      }, 
      {
        "affiliation": "Institute of Theoretical & Applied Informatics, Polish Academy of Sciences, Gliwice, Poland", 
        "name": "Gelenbe, Erol"
      }
    ], 
    "meeting": {
      "acronym": "IEEE CSCloud 2019", 
      "url": "http://www.cloud-conf.net/cscloud/2019/cscloud/", 
      "dates": "21-23 June 2019", 
      "place": "Paris, France", 
      "title": "6th IEEE International Conference on Cyber Security and Cloud Computing (IEEE CSCloud 2019)"
    }, 
    "access_right": "open", 
    "resource_type": {
      "subtype": "conferencepaper", 
      "type": "publication", 
      "title": "Conference paper"
    }, 
    "description": "<p>Checkpointing is commonly adopted for enhancing the performance of software applications that operate in the presence of failures. Among the existing checkpointing strategies, Application-level Checkpoint and Restart (ALCR) is considered the most efficient, since it leaves smaller memory footprint, but it requires significant development effort. Although existing ALCR tools and libraries manage to reduce the effort required for implementing the checkpoints, they do not provide recommendations regarding their inter-checkpoint interval. To this end, in the present paper, we develop a mathematical model to estimate the optimum checkpoint interval, i.e., the interval between two successive checkpoints that minimises the average execution time of the application. The case of programs with loops and nested loops is also discussed. The results are illustrated with several numerical examples.</p>"
  }
}
42
70
views
downloads
All versions This version
Views 4242
Downloads 7070
Data volume 31.8 MB31.8 MB
Unique views 3939
Unique downloads 6868

Share

Cite as