Several recent papers have introduced a periodic verification mechanism to detect silent errorsin iterative solvers. Chen [PPoPP'13, pp. 167--176] has shown how to combine such a verification mechanism(a stability test checking the orthogonality of two vectors and recomputing the residual)with checkpointing: the idea is to verify every $d$ iterations, and to checkpoint every $c \times d$ iterations. When a silent error is detected by the verification mechanism, one can rollback to and re-execute from the last checkpoint. In this paper, we also propose to combine checkpointing and verification, but we use ABFT rather than stability tests. ABFT can be used for error detection, but also for error detection and correction, allowing a forward r...
We focus on High Performance Computing (HPC) workflows whose dependency graphforms a linear chain, a...
International audienceWe focus on High Performance Computing (HPC) workflows whose dependency graph ...
In this paper, we combine the traditional checkpointing and rollback recovery strategies with verifi...
International audienceSeveral recent papers have introduced a periodic verification mechanism to det...
International audienceSeveral recent papers have introduced a periodic verification mechanism to det...
Several recent papers have introduced a periodic verification mechanism to detect silent errorsin it...
Several recent papers have introduced a periodic verification mechanism to detect silent errors i...
Fail-stop and silent errors are omnipresent on large-scale platforms. Efficient resilience technique...
This report describes a unified framework for the detection and correction of silent errors,which co...
International audienceErrors have become a critical problem for high performance computing. Checkpoi...
International audienceIn this paper, we revisit traditional checkpointing and rollback recovery stra...
Resilience has become a critical problem for high performance computing. Checkpointing protocols are...
Silent errors, or silent data corruptions, constitute a major threat on very large scale platforms. ...
International audienceFail-stop and silent errors are unavoidable on large-scale platforms. Efficien...
International audienceFail-stop and silent errors are omnipresent on large-scale platforms. Efficien...
We focus on High Performance Computing (HPC) workflows whose dependency graphforms a linear chain, a...
International audienceWe focus on High Performance Computing (HPC) workflows whose dependency graph ...
In this paper, we combine the traditional checkpointing and rollback recovery strategies with verifi...
International audienceSeveral recent papers have introduced a periodic verification mechanism to det...
International audienceSeveral recent papers have introduced a periodic verification mechanism to det...
Several recent papers have introduced a periodic verification mechanism to detect silent errorsin it...
Several recent papers have introduced a periodic verification mechanism to detect silent errors i...
Fail-stop and silent errors are omnipresent on large-scale platforms. Efficient resilience technique...
This report describes a unified framework for the detection and correction of silent errors,which co...
International audienceErrors have become a critical problem for high performance computing. Checkpoi...
International audienceIn this paper, we revisit traditional checkpointing and rollback recovery stra...
Resilience has become a critical problem for high performance computing. Checkpointing protocols are...
Silent errors, or silent data corruptions, constitute a major threat on very large scale platforms. ...
International audienceFail-stop and silent errors are unavoidable on large-scale platforms. Efficien...
International audienceFail-stop and silent errors are omnipresent on large-scale platforms. Efficien...
We focus on High Performance Computing (HPC) workflows whose dependency graphforms a linear chain, a...
International audienceWe focus on High Performance Computing (HPC) workflows whose dependency graph ...
In this paper, we combine the traditional checkpointing and rollback recovery strategies with verifi...