An Effective Checkpointing and Replication Techniques for Computation