Publications
Export 3 results:
Filters: Keyword is silent data corruption and Author is Anne Benoit [Clear All Filters]
On the Combination of Silent Error Detection and Checkpointing,”
UT-CS-13-710: University of Tennessee Computer Science Technical Report, June 2013.
(1.29 MB)
“Efficient Checkpoint/Verification Patterns,”
International Journal on High Performance Computing Applications, July 2015.
(392.76 KB)
“Assessing General-purpose Algorithms to Cope with Fail-stop and Silent Errors,”
ACM Transactions on Parallel Computing, August 2016.
(573.71 KB)
“