Theoretical and experimental evaluation of communication-induced checkpointing protocols in FE family

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Communication-Induced Checkpointing (CIC) protocols can not only bound rollback propagation but also allow each process to take checkpoints independently while at the same time ensure all checkpoints to be useful. In this paper, we present both theoretical and experimental evaluation of protocols in a particular CIC protocol family, called FE family in the literature, and also the FE-Lazy family which is the corresponding family obtained by applying "Lazy Indexing Strategy" to the F E family.

Original languageEnglish
Title of host publication2008 IEEE International Performance Computing and Communications Conference, IPCCC 2008
Pages217-224
Number of pages8
DOIs
StatePublished - 2008
Event2008 IEEE International Performance Computing and Communications Conference, IPCCC 2008 - Austin, TX, United States
Duration: Dec 7 2008Dec 9 2008

Publication series

NameConference Proceedings of the IEEE International Performance, Computing, and Communications Conference

Conference

Conference2008 IEEE International Performance Computing and Communications Conference, IPCCC 2008
Country/TerritoryUnited States
CityAustin, TX
Period12/7/0812/9/08

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'Theoretical and experimental evaluation of communication-induced checkpointing protocols in FE family'. Together they form a unique fingerprint.

Cite this