International audienceFail-stop and silent errors are unavoidable on large-scale platforms. Efficient resilience techniques must accommodate both error sources. A traditional checkpointing and rollback recovery approach can be used, with added veri-fications to detect silent errors. A fail-stop error leads to the loss of the whole memory content, hence the obligation to checkpoint on a stable storage (e.g., an external disk). On the contrary, it is possible to use in-memory checkpoints for silent errors, which provide a much smaller checkpoint and recovery overhead. Furthermore, recent detectors offer partial verification mechanisms, which are less costly than guaranteed verifications but do not detect all silent errors. In this paper, we s...
International audienceIn this paper, we combine the traditional checkpointing and rollback recovery ...
International audienceSilent errors, or silent data corruptions, constitute a major threat on very l...
In this paper, we revisit traditional checkpointing and rollback recovery strategies, with a focus o...
International audienceFail-stop and silent errors are omnipresent on large-scale platforms. Efficien...
Fail-stop and silent errors are omnipresent on large-scale platforms. Efficient resilience technique...
International audienceWe focus on High Performance Computing (HPC) workflows whose dependency graph ...
We focus on High Performance Computing (HPC) workflows whose dependency graphforms a linear chain, a...
Resilience has become a critical problem for high performance computing. Checkpointing protocols are...
International audienceErrors have become a critical problem for high performance computing. Checkpoi...
International audienceIn this paper, we revisit traditional checkpointing and rollback recovery stra...
International audienceThis chapter describes a unified framework for the detection and correction of...
In this paper, we combine the traditional checkpointing and rollback recovery strategies with verifi...
International audienceThis work focuses on resilience techniques at extreme scale. Many papers deal ...
International audienceIn this paper, we combine the traditional checkpointing and rollback recovery ...
International audienceSilent errors, or silent data corruptions, constitute a major threat on very l...
In this paper, we revisit traditional checkpointing and rollback recovery strategies, with a focus o...
International audienceFail-stop and silent errors are omnipresent on large-scale platforms. Efficien...
Fail-stop and silent errors are omnipresent on large-scale platforms. Efficient resilience technique...
International audienceWe focus on High Performance Computing (HPC) workflows whose dependency graph ...
We focus on High Performance Computing (HPC) workflows whose dependency graphforms a linear chain, a...
Resilience has become a critical problem for high performance computing. Checkpointing protocols are...
International audienceErrors have become a critical problem for high performance computing. Checkpoi...
International audienceIn this paper, we revisit traditional checkpointing and rollback recovery stra...
International audienceThis chapter describes a unified framework for the detection and correction of...
In this paper, we combine the traditional checkpointing and rollback recovery strategies with verifi...
International audienceThis work focuses on resilience techniques at extreme scale. Many papers deal ...
International audienceIn this paper, we combine the traditional checkpointing and rollback recovery ...
International audienceSilent errors, or silent data corruptions, constitute a major threat on very l...
In this paper, we revisit traditional checkpointing and rollback recovery strategies, with a focus o...