Computation Checkpointing & Migration - Vipin Chaudhary
- Format: Relié Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtre781,82 €
Occasion · Comme Neuf
Ou 195,46 € /mois
- Livraison : 6,59 €
- Livré entre le 30 avril et le 6 mai
LIVRE A L'ETAT DE NEUF. EXPEDIE SOUS 3 JOURS OUVRES. NUMERO DE SUIVI COMMUNIQUE AVANT ENVOI, EMBALLAGE RENFORCE. EAN:9781607418405
- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Computation Checkpointing & Migration de Vipin Chaudhary Format Relié - Livre
0 avis sur Computation Checkpointing & Migration de Vipin Chaudhary Format Relié - Livre
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
Présentation Computation Checkpointing & Migration de Vipin Chaudhary Format Relié
- Livre
Résumé :
Computational clusters have long provided a mechanism for the acceleration of high performance computing (HPC) applications. With today's supercomputers now exceeding the petaflop scale, however, they are also exhibiting an increase in heterogeneity. Thisheterogeneity spans a range of technologies, from multiple operating systems to hardware accelerators and novel architectures. Because of the exceptional acceleration some of these heterogeneous architectures provide, they are being embraced as viable tools for HPC applications. Given the scale of today's supercomputers, it is clear that scientists must consider the use of fault-tolerance in their applications. This is particularly true as computational clusters with hundreds and thousands of processors become ubiquitous in large-scale scientific computing, leading to lower mean-times-to-failure. This forces the systems to effectively deal with the possibility of arbitrary and unexpected node failure. In this book the address the issue of fault-tolerance via checkpointing. They discuss the existing strategies to provide rollback recovery to applications -- both via MPI at the user level and through application-level techniques. Checkpointing itself has been studied extensively in the literature, including the authors' own works. Here they give a general overview of checkpointing and how it's implemented. More importantly, they describe strategies to improve the performance of checkpointing, particularly in the case of distributed systems.
Détails de conformité du produit
Personne responsable dans l'UE