1. Wang, Y.M., Huang, Y., Vo, K.-P., Chung, P.-Y., Kintala, C.: Checkpointing and its applications. In: Proceedings of the Twenty-Fifth International Symposium on Fault-Tolerant Computing, p. 22. Institute of Electrical and Electronics Engineers, Inc., Washington, DC (1995)
2. Pei, D.: Modification operations buffering: a low overhead approach to checkpoint user files. In: Proceedings of IEEE 29th Symposium on Fault-Tolerant Computing, Madison USA, pp. 36–38 (1999)
3. Duell, J.: The design and implementation of Berkeley Lab’s Linux checkpoint/restart. Berkeley Lab Technical report, LBNL-54941 (2002)
4. Duell, J., Hargrove, P., Roman, E.: Requirements for Linux checkpoint/restart. Berkeley Lab Technical report, LBNL-49659 (2002)
5. Roman, E.: A survey of checkpoint/restart implementations. Berkeley Lab Technical report, LBNL-54942 (2002)