Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing 2010
DOI: 10.1145/1851476.1851509
|View full text |Cite
|
Sign up to set email alerts
|

Impact of sub-optimal checkpoint intervals on application efficiency in computational clusters

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(15 citation statements)
references
References 6 publications
0
15
0
Order By: Relevance
“…In [7], Daly studies periodic checkpointing policies for Exponentially distributed failures, generalizing the well-known bound obtained by Young [23]. Daly extended his work in [13] to study the impact of sub-optimal checkpointing periods. In [20], the authors develop an "optimal" checkpointing policy, based on the popular assumption that optimal checkpointing must be periodic.…”
Section: Related Workmentioning
confidence: 94%
“…In [7], Daly studies periodic checkpointing policies for Exponentially distributed failures, generalizing the well-known bound obtained by Young [23]. Daly extended his work in [13] to study the impact of sub-optimal checkpointing periods. In [20], the authors develop an "optimal" checkpointing policy, based on the popular assumption that optimal checkpointing must be periodic.…”
Section: Related Workmentioning
confidence: 94%
“…In [10], Daly studies periodic checkpointing for Exponential failures, generalizing the well-known bound obtained by Young [11]. In [12] he studies the impact of sub-optimal checkpointing periods. In [13], Venkatesh develops an ''optimal'' checkpointing policy, based on the popular assumption that optimal checkpointing must be periodic.…”
Section: Related Workmentioning
confidence: 95%
“…Another drawback is the burden placed on the I/O infrastructure, since the checkpoint I/O may actually interfere with communication and I/O of other applications. The impact of suboptimal checkpoint intervals is investigated in [68]. System-level checkpoint can also be used in production, with technologies such as BLCR [63].…”
Section: Checkpointingmentioning
confidence: 99%