@techreport{weko_83960_1, author = "LeonardoBautistaGomez and Satoshi,Matsuoka", title = "Avoiding silent data corruption in checkpoint files", year = "2012", institution = "Tokyo Institute of Technology, Tokyo Institute of Technology", number = "11", month = "sep" }