2016 IEEE International Conference on Cluster Computing (CLUSTER) 2016
DOI: 10.1109/cluster.2016.55
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation for Checkpointing of Distributed Resources Using Process-Level Virtualization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
22
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
2

Relationship

4
3

Authors

Journals

citations
Cited by 19 publications
(23 citation statements)
references
References 17 publications
1
22
0
Order By: Relevance
“…The plugin libraries are injected along with the checkpoint library. They serve to translate real ids into virtual ids seen by the application, and to update the virtual address translation table with the new real ids that are seen on restart [21]. This virtualization capability is used to virtualize below the level of the MPI library 4.4.2).…”
Section: Dmtcpmentioning
confidence: 99%
“…The plugin libraries are injected along with the checkpoint library. They serve to translate real ids into virtual ids seen by the application, and to update the virtual address translation table with the new real ids that are seen on restart [21]. This virtualization capability is used to virtualize below the level of the MPI library 4.4.2).…”
Section: Dmtcpmentioning
confidence: 99%
“…Experiments use DMTCP [27] version 3.0. We developed a CRUM-specific DMTCP plugin [28] for checkpoint-restart of NVIDIA CUDA UVM applications. The DMTCP CRUM plugin (referred to as the CRUM plugin from here onwards) interposes on the CUDA calls made by the application.…”
Section: Softwarementioning
confidence: 99%
“…DMTCP provides a transparent checkpointing mechanism that provides for checkpoint/restart without any modification of the original application code or operating system. DMTCP also provides a plugin facility to adapt the transparent checkpointing capability of the target application to external subsystems, such as the handling of a network connection [3].…”
Section: A Checkpointing Mechanismmentioning
confidence: 99%
“…It may use a communication protocol, such as Bluetooth or Wi-Fi, in order to send or receive information from a gateway. This concept is aligned with the definition of Sensor from the SSN ontology 3 .…”
Section: A System Representationmentioning
confidence: 99%