Libckpt: Transparent Checkpointing under UNIX
- J. Plank, M. Beck, G. Kingsley, Kai Li
- Computer ScienceUSENIX Annual Technical Conference
- 16 January 1995
Checkpointing is a simple technique for rollback recovery: the state of an executing program is periodically saved to a disk file from which it can be recovered after a failure. While recent research…
The Internet Backplane Protocol: Storage in the Network
The development of IBP is discussed, the implementation of a prototype system for managing network storage, and a preliminary deployment as part of the Internet-2 Distributed Storage Initiative are discussed.
Dependence flow graphs: an algebraic approach to program dependencies
- K. Pingali, M. Beck, Richard Johnson, M. Moudgill, P. Stodghill
- Computer ScienceACM-SIGACT Symposium on Principles of Programming…
- 3 January 1991
This paper argues that any good representation of a program must be a data structure that can be rapidly traversed to determine dependence information, and proposes a novel representation called the dependence flow graph which has each of the properties mentioned above.
Memory exclusion: optimizing the performance of checkpointing systems
- J. Plank, Yuqun Chen, Kai Li, M. Beck, G. Kingsley
- Computer ScienceSoftware, Practice & Experience
- 1 February 1999
Memory exclusion is described, an important class of optimizations that reduce the overhead of checkpointing that is implemented in two checkpointers: libckpt, which works on Unix‐based workstations, and CLIP, which work on the Intel Paragon.
An end-to-end approach to globally scalable network storage
- M. Beck, T. Moore, J. Plank
- Computer Science, BusinessConference on Applications, Technologies…
- 1 October 2002
The Internet Backplane Protocol and the exNode are described, which are tools that have been designed to create a network storage substrate that adheres to end-to-end design principles, and this approach is believed to be fundamental to the future of truly scalable communication.
Sorting Large Files on a Backend Multiprocessor
- M. Beck, D. Bitton, K. Wilkinson
- Computer ScienceIEEE Trans. Computers
- 1 July 1988
The results show that using current, off-the-shelf technology coupled with a streamlined distributed operating system, three- and five-microprocessor configurations, provide a very cost-effective sort of large files.
Compiler-Assisted Memory Exclusion for Fast Checkpointing
- J. Plank, M. Beck, G. Kingsley
- Computer Science
- 1995
Comp compiler-assisted memory exclusion (CAME), a technique that uses static program analysis to optimize the performance of checkpoint-ing, and can be a signiicant reduction in the size of checkpoints, thereby reducing the overhead of checkpointing.
From Control Flow to Dataflow
- M. Beck, Richard Johnson, K. Pingali
- Computer ScienceJ. Parallel Distributed Comput.
- 1 June 1991
...
...