Line 40:
Line 40:
* 2024-04-22, [https://dl.acm.org/doi/abs/10.1145/3627703.3650085 Just-In-Time Checkpointing: Low Cost Error Recovery from Deep Learning Training Failures]
* 2024-04-22, [https://dl.acm.org/doi/abs/10.1145/3627703.3650085 Just-In-Time Checkpointing: Low Cost Error Recovery from Deep Learning Training Failures]
* 2024-04-22, [https://dl.acm.org/doi/10.1145/3627703.3629556 Pronghorn: Effective Checkpoint Orchestration for Serverless Hot-Starts]
* 2024-04-22, [https://dl.acm.org/doi/10.1145/3627703.3629556 Pronghorn: Effective Checkpoint Orchestration for Serverless Hot-Starts]
+
* 2024-02-09, [https://ejournal.unitomo.ac.id/index.php/inform/article/view/7498/3738 Forensic Analysis of Podman Container Towards Metasploit Backdoor Using Checkpointctl]
* 2024-01-29, [https://www.sciencedirect.com/science/article/pii/S0167739X24000190 Prebaking runtime environments to improve the FaaS cold start latency]
* 2024-01-29, [https://www.sciencedirect.com/science/article/pii/S0167739X24000190 Prebaking runtime environments to improve the FaaS cold start latency]
* 2023-11-27, [https://dl.acm.org/doi/abs/10.1145/3590140.3629121 DynaCut: A Framework for Dynamic and Adaptive Program Customization]
* 2023-11-27, [https://dl.acm.org/doi/abs/10.1145/3590140.3629121 DynaCut: A Framework for Dynamic and Adaptive Program Customization]