
Kento Sato
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c20]Tonmoy Dey, Kento Sato, Bogdan Nicolae, Jian Guo, Jens Domke, Weikuan Yu, Franck Cappello, Kathryn Mohror:
Optimizing Asynchronous Multi-Level Checkpoint/Restart Configurations with Machine Learning. IPDPS Workshops 2020: 1036-1043
2010 – 2019
- 2019
- [j3]Kento Sato, Ignacio Laguna, Gregory L. Lee, Martin Schulz, Christopher M. Chambreau, Simone Atzeni, Michael Bentley, Ganesh Gopalakrishnan, Zvonimir Rakamaric, Geof Sawaya, Joachim Protze
, Dong H. Ahn:
Pruners. Int. J. High Perform. Comput. Appl. 33(5) (2019) - [j2]Dylan Chapp
, Danny Rorabaugh
, Kento Sato, Dong H. Ahn, Michela Taufer
:
A three-phase workflow for general and expressive representations of nondeterminism in HPC applications. Int. J. High Perform. Comput. Appl. 33(6) (2019) - [e1]Francesca Palumbo, Michela Becchi, Martin Schulz, Kento Sato:
Proceedings of the 16th ACM International Conference on Computing Frontiers, CF 2019, Alghero, Italy, April 30 - May 2, 2019. ACM 2019, ISBN 978-1-4503-6685-4 [contents] - 2018
- [j1]Dylan Chapp, Kento Sato, Dong H. Ahn, Michela Taufer:
Record-and-Replay Techniques for HPC Systems: A Survey. Supercomput. Front. Innov. 5(1): 11-30 (2018) - [c19]Yue Zhu, Teng Wang, Kathryn Mohror, Adam Moody, Kento Sato, Muhib Khan, Weikuan Yu:
Direct-FUSE: Removing the Middleman for High-Performance FUSE File System Support. ROSS@HPDC 2018: 6:1-6:8 - [c18]Tianqi Xu, Kento Sato, Satoshi Matsuoka:
Explorations of Data Swapping on Burst Buffer. ICPADS 2018: 517-526 - [c17]Yue Zhu, Fahim Chowdhury, Huansong Fu, Adam Moody, Kathryn Mohror, Kento Sato, Weikuan Yu:
Entropy-Aware I/O Pipelining for Large-Scale Deep Learning on HPC Systems. MASCOTS 2018: 145-156 - 2017
- [c16]Kevin A. Brown, Tianqi Xu, Keita Iwabuchi, Kento Sato, Adam Moody, Kathryn Mohror
, Nikhil Jain, Abhinav Bhatele, Martin Schulz, Roger A. Pearce, Maya B. Gokhale, Satoshi Matsuoka:
Accelerating Big Data Infrastructure and Applications (Ongoing Collaboration). ICDCS Workshops 2017: 343-347 - [c15]Teng Wang, Adam Moody, Yue Zhu, Kathryn Mohror
, Kento Sato, Tanzima Islam
, Weikuan Yu:
MetaKV: A Key-Value Store for Metadata Management of Distributed Burst Buffers. IPDPS 2017: 1174-1183 - [c14]Kento Sato, Dong H. Ahn, Ignacio Laguna, Gregory L. Lee, Martin Schulz, Christopher M. Chambreau:
Noise Injection Techniques to Expose Subtle and Unintended Message Races. PPOPP 2017: 89-101 - 2016
- [c13]Tianqi Xu, Kento Sato, Satoshi Matsuoka:
CloudBB: Scalable I/O Accelerator for Shared Cloud Storage. ICPADS 2016: 509-518 - [c12]Teng Wang, Kathryn Mohror
, Adam Moody, Kento Sato, Weikuan Yu:
An ephemeral burst-buffer file system for scientific applications. SC 2016: 807-818 - 2015
- [c11]Moshe Gabel, Kento Sato, Daniel Keren, Satoshi Matsuoka, Assaf Schuster:
Latent Fault Detection With Unbalanced Workloads. EDBT/ICDT Workshops 2015: 118-124 - [c10]Naoto Sasaki, Kento Sato, Toshio Endo, Satoshi Matsuoka:
Exploration of Lossy Compression for Application-Level Checkpoint/Restart. IPDPS 2015: 914-922 - [c9]Kento Sato, Dong H. Ahn, Ignacio Laguna, Gregory L. Lee, Martin Schulz:
Clock delta compression for scalable order-replay of non-deterministic parallel applications. SC 2015: 62:1-62:12 - 2014
- [c8]Kento Sato, Kathryn Mohror
, Adam Moody, Todd Gamblin, Bronis R. de Supinski, Naoya Maruyama, Satoshi Matsuoka:
A User-Level InfiniBand-Based File System and Checkpoint Strategy for Burst Buffers. CCGRID 2014: 21-30 - [c7]Kento Sato, Adam Moody, Kathryn Mohror
, Todd Gamblin, Bronis R. de Supinski, Naoya Maruyama, Satoshi Matsuoka:
FMI: Fault Tolerant Messaging Interface for Fast and Transparent Recovery. IPDPS 2014: 1225-1234 - 2013
- [c6]Takafumi Saito, Kento Sato, Hitoshi Sato, Satoshi Matsuoka:
Energy-aware I/O optimization for checkpoint and restart on a NAND flash memory system. FTXS 2013: 41-48 - 2012
- [c5]Kento Sato, Naoya Maruyama, Kathryn Mohror
, Adam Moody, Todd Gamblin, Bronis R. de Supinski, Satoshi Matsuoka:
Design and modeling of a non-blocking checkpointing system. SC 2012: 19 - [c4]Akira Nukada, Kento Sato, Satoshi Matsuoka:
Scalable multi-GPU 3-D FFT for TSUBAME 2.0 supercomputer. SC 2012: 44 - 2011
- [c3]Naoya Maruyama, Tatsuo Nomura, Kento Sato, Satoshi Matsuoka:
Physis: an implicitly parallel programming model for stencil computations on large-scale GPU-accelerated supercomputers. SC 2011: 11:1-11:12
2000 – 2009
- 2009
- [c2]Kento Sato, Hitoshi Sato
, Satoshi Matsuoka:
A Model-Based Algorithm for Optimizing I/O Intensive Applications in Clouds Using VM-Based Migration. CCGRID 2009: 466-471 - 2008
- [c1]Kento Sato, Hitoshi Sato, Satoshi Matsuoka:
Model-based optimization for data-intensive application on virtual cluster. GRID 2008: 367-368
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-12-12 23:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint