callback( { "result":{ "query":":facetid:toc:\"db/conf/hpdc/ftxs2016.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"65.89" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"8", "@dc":"8", "@oc":"8", "@id":"43385521", "text":":facetid:toc:db/conf/hpdc/ftxs2016.bht" } }, "hits":{ "@total":"8", "@computed":"8", "@sent":"8", "@first":"0", "hit":[{ "@score":"1", "@id":"3255755", "info":{"authors":{"author":[{"@pid":"132/1713","text":"Scott Levy"},{"@pid":"92/3604","text":"Kurt B. Ferreira"}]},"title":"An Examination of the Impact of Failure Distribution on Coordinated Checkpoint/Restart.","venue":"FTXS@HPDC","pages":"35-42","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hpdc/LevyF16","doi":"10.1145/2909428.2909430","ee":"https://doi.org/10.1145/2909428.2909430","url":"https://dblp.org/rec/conf/hpdc/LevyF16"}, "url":"URL#3255755" }, { "@score":"1", "@id":"3255765", "info":{"authors":{"author":[{"@pid":"183/2563","text":"Allan S. Nielsen"},{"@pid":"44/399","text":"Jan S. Hesthaven"}]},"title":"Fault Tolerance in the Parareal Method.","venue":"FTXS@HPDC","pages":"1-8","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hpdc/NielsenH16","doi":"10.1145/2909428.2909431","ee":"https://doi.org/10.1145/2909428.2909431","url":"https://dblp.org/rec/conf/hpdc/NielsenH16"}, "url":"URL#3255765" }, { "@score":"1", "@id":"3255767", "info":{"authors":{"author":[{"@pid":"183/2630","text":"Zachary W. Parchman"},{"@pid":"02/6184","text":"Geoffroy Vallée"},{"@pid":"04/1344","text":"Thomas J. Naughton"},{"@pid":"71/4514","text":"Christian Engelmann"},{"@pid":"07/5173","text":"David E. Bernholdt"},{"@pid":"85/5552","text":"Stephen L. Scott"}]},"title":"Adding Fault Tolerance to NPB Benchmarks Using ULFM.","venue":"FTXS@HPDC","pages":"27-34","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hpdc/ParchmanVNEBS16","doi":"10.1145/2909428.2909434","ee":"https://doi.org/10.1145/2909428.2909434","url":"https://dblp.org/rec/conf/hpdc/ParchmanVNEBS16"}, "url":"URL#3255767" }, { "@score":"1", "@id":"3255768", "info":{"authors":{"author":[{"@pid":"01/9475","text":"Francesco Rizzi"},{"@pid":"00/3270","text":"Karla Morris"},{"@pid":"85/7789","text":"Khachik Sargsyan"},{"@pid":"170/2189","text":"Paul Mycek"},{"@pid":"88/7789","text":"Cosmin Safta"},{"@pid":"86/518","text":"Bert J. Debusschere"},{"@pid":"28/7813","text":"Olivier P. Le Maître"},{"@pid":"05/5889","text":"Omar M. Knio"}]},"title":"ULFM-MPI Implementation of a Resilient Task-Based Partial Differential Equations Preconditioner.","venue":"FTXS@HPDC","pages":"19-26","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hpdc/RizziMSMSDLK16","doi":"10.1145/2909428.2909429","ee":"https://doi.org/10.1145/2909428.2909429","url":"https://dblp.org/rec/conf/hpdc/RizziMSMSDLK16"}, "url":"URL#3255768" }, { "@score":"1", "@id":"3255771", "info":{"authors":{"author":[{"@pid":"68/9127","text":"Maher Salloum"},{"@pid":"91/105","text":"Jackson R. Mayo"},{"@pid":"26/971","text":"Robert C. Armstrong"}]},"title":"In-Situ Mitigation of Silent Data Corruption in PDE Solvers.","venue":"FTXS@HPDC","pages":"43-48","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hpdc/SalloumMA16","doi":"10.1145/2909428.2909433","ee":"https://doi.org/10.1145/2909428.2909433","url":"https://dblp.org/rec/conf/hpdc/SalloumMA16"}, "url":"URL#3255771" }, { "@score":"1", "@id":"3255772", "info":{"authors":{"author":[{"@pid":"142/8979","text":"Piyush Sao"},{"@pid":"116/0802","text":"Oded Green"},{"@pid":"25/5723","text":"Chirag Jain"},{"@pid":"v/RVuduc","text":"Richard W. Vuduc"}]},"title":"A Self-Correcting Connected Components Algorithm.","venue":"FTXS@HPDC","pages":"9-16","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hpdc/SaoGJV16","doi":"10.1145/2909428.2909435","ee":"https://doi.org/10.1145/2909428.2909435","url":"https://dblp.org/rec/conf/hpdc/SaoGJV16"}, "url":"URL#3255772" }, { "@score":"1", "@id":"3255776", "info":{"authors":{"author":{"@pid":"16/9928","text":"Fumiyoshi Shoji"}},"title":"The K computer and its failures.","venue":"FTXS@HPDC","pages":"17","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/hpdc/Shoji16","doi":"10.1145/2909428.2909436","ee":"https://doi.org/10.1145/2909428.2909436","url":"https://dblp.org/rec/conf/hpdc/Shoji16"}, "url":"URL#3255776" }, { "@score":"1", "@id":"3359472", "info":{"authors":{"author":{"@pid":"86/833","text":"Nathan DeBardeleben"}},"title":"Proceedings of the ACM Workshop on Fault-Tolerance for HPC at Extreme Scale, FTXS@HPDC 2016, Kyoto, Japan, May 31, 2016","venue":"FTXS@HPDC","publisher":"ACM","year":"2016","type":"Editorship","key":"conf/hpdc/2016ftxs","doi":"10.1145/2909428","ee":"https://doi.org/10.1145/2909428","url":"https://dblp.org/rec/conf/hpdc/2016ftxs"}, "url":"URL#3359472" } ] } } } )