2009
DOI: 10.1137/080718036
|View full text |Cite
|
Sign up to set email alerts
|

MultiStage Approaches for Optimal Offline Checkpointing

Abstract: The computation of derivatives for optimizing time-dependent flow problems is often based on the integration of the adjoint differential equation. For this purpose, the knowledge of the complete forward solution is required. In the area of flow control, especially for three-dimensional problems, it may be impossible to keep track of the full forward solution due to the lack of storage capacities. One usual method to overcome this problem is checkpointing. Using a checkpointing strategy, only parts of the forwa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 37 publications
(32 citation statements)
references
References 12 publications
0
32
0
Order By: Relevance
“…Therefore, the access time to read or write a checkpoint is not negligible in contrast to the assumption frequently made for the development of checkpointing approaches. There are a few contributions that extend the available checkpointing techniques to a hierarchical checkpointing (Aupy, Herrmann, Hovland, & Robert, 2016;Schanen, Marin, Anitescu, & Z, 2016;Stumm & Walther, 2009).…”
Section: Checkpointingmentioning
confidence: 99%
“…Therefore, the access time to read or write a checkpoint is not negligible in contrast to the assumption frequently made for the development of checkpointing approaches. There are a few contributions that extend the available checkpointing techniques to a hierarchical checkpointing (Aupy, Herrmann, Hovland, & Robert, 2016;Schanen, Marin, Anitescu, & Z, 2016;Stumm & Walther, 2009).…”
Section: Checkpointingmentioning
confidence: 99%
“…However, the sweeps of such F 2 cannot be saved anyway in those checkpointing algorithms (Griewank and Walther 2000, Stumm et al 2009, Wang et al 2009 or else the maximum number of checkpoints could not be reached in this way when the available memory is limited. Under the restriction of a given memory consumption, in another words, no one can make sure which adjoint implementation is of lower computational cost either the maximum number of checkpoints or less in combination of this way.…”
Section: ∇ •mentioning
confidence: 99%
“…To test the checkpointing implementation, libadjoint was configured to use the multistage checkpointing algorithm of revolve [49], with 5 checkpoints available in memory and 10 on disk. As described in section 5.1, the use of this checkpointing algorithm is entirely transparent to the DOLFIN user.…”
Section: Examplesmentioning
confidence: 99%