TY - GEN
T1 - Theoretical and experimental evaluation of communication-induced checkpointing protocols in FE family
AU - Luo, Yi
AU - Manivannan, D.
PY - 2008
Y1 - 2008
N2 - Communication-Induced Checkpointing (CIC) protocols can not only bound rollback propagation but also allow each process to take checkpoints independently while at the same time ensure all checkpoints to be useful. In this paper, we present both theoretical and experimental evaluation of protocols in a particular CIC protocol family, called FE family in the literature, and also the FE-Lazy family which is the corresponding family obtained by applying "Lazy Indexing Strategy" to the F E family.
AB - Communication-Induced Checkpointing (CIC) protocols can not only bound rollback propagation but also allow each process to take checkpoints independently while at the same time ensure all checkpoints to be useful. In this paper, we present both theoretical and experimental evaluation of protocols in a particular CIC protocol family, called FE family in the literature, and also the FE-Lazy family which is the corresponding family obtained by applying "Lazy Indexing Strategy" to the F E family.
UR - http://www.scopus.com/inward/record.url?scp=62849126330&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=62849126330&partnerID=8YFLogxK
U2 - 10.1109/PCCC.2008.4745112
DO - 10.1109/PCCC.2008.4745112
M3 - Conference contribution
AN - SCOPUS:62849126330
SN - 9781424433674
T3 - Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference
SP - 217
EP - 224
BT - 2008 IEEE International Performance Computing and Communications Conference, IPCCC 2008
T2 - 2008 IEEE International Performance Computing and Communications Conference, IPCCC 2008
Y2 - 7 December 2008 through 9 December 2008
ER -