Coping with recall and precision of soft error detectors

被引:10
作者
Bautista-Gomez, Leonardo [1 ]
Benoit, Anne [2 ,3 ]
Cavelan, Aurelien [2 ,3 ]
Raina, Saurabh K. [4 ]
Robert, Yves [2 ,3 ,5 ]
Sun, Hongyang [2 ,3 ]
机构
[1] Argonne Natl Lab, Argonne, IL 60439 USA
[2] Ecole Normale Super Lyon, Lyon, France
[3] INRIA, Rocquencourt, France
[4] Jaypee Inst Informat Technol, Noida, Uttar Pradesh, India
[5] Univ Tennessee, Knoxville, TN USA
关键词
Fault tolerance; High-performance computing; Silent data corruption; Partial verification; Recall and precision; Exascale; FAULT-TOLERANCE; REDUNDANCY;
D O I
10.1016/j.jpdc.2016.07.007
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Many methods are available to detect silent errors in high-performance computing (HPC) applications. Each method comes with a cost, a recall (fraction of all errors that are actually detected, i.e., false negatives), and a precision (fraction of true errors amongst all detected errors, i.e., false positives). The main contribution of this paper is to characterize the optimal computing pattern for an application: which detector(s) to use, how many detectors of each type to use, together with the length of the work segment that precedes each of them. We first prove that detectors with imperfect precisions offer limited usefulness. Then we focus on detectors with perfect precision, and we conduct a comprehensive complexity analysis of this optimization problem, showing NP-completeness and designing an FPTAS (Fully Polynomial-Time Approximation Scheme). On the practical side, we provide a greedy algorithm, whose performance is shown to be close to the optimal fora realistic set of evaluation scenarios. Extensive simulations illustrate the usefulness of detectors with false negatives, which are available at a lower cost than the guaranteed detectors. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:8 / 24
页数:17
相关论文
共 40 条
  • [1] [Anonymous], 1979, Computers and Intractablity: A Guide to the Theory of NP-Completeness
  • [2] [Anonymous], P SC 13
  • [3] [Anonymous], 2010, P INT C HIGH PERF CO, DOI DOI 10.1109/SC.2010.18
  • [4] [Anonymous], P 1 INT WORKSH FAULT
  • [5] [Anonymous], INT J HIGH PERFORM C
  • [6] [Anonymous], RR8786 INRIA
  • [7] [Anonymous], 2014, SUPERCOMPUT FRONT IN
  • [8] [Anonymous], 2004, Knapsack Problems, DOI DOI 10.1007/978-3-540-24777-710
  • [9] On the Combination of Silent Error Detection and Checkpointing
    Aupy, Guillaume
    Benoit, Anne
    Herault, Thomas
    Robert, Yves
    Vivien, Frederic
    Zaidouni, Dounia
    [J]. 2013 IEEE 19TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2013), 2013, : 11 - 20
  • [10] Checkpointing algorithms and fault prediction
    Aupy, Guillaume
    Robert, Yves
    Vivien, Frederic
    Zaidouni, Dounia
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2014, 74 (02) : 2048 - 2064