[BOOK][B] Data management for mobile computing
Earth date, August 11, 1997" Beam me up Scottie!"" We cannot do it! This is not Star Trek's
Enterprise. This is early years Earth." True, this is not yet the era of Star Trek, we cannot …
Enterprise. This is early years Earth." True, this is not yet the era of Star Trek, we cannot …
[PDF][PDF] Adaptive recovery for mobile environments
Nuno Neves and W. Kent Fuchs failure, the application rolls back to the last saved state and
then restarts its execution. Checkpoint protocols proposed in the past are not adequate for …
then restarts its execution. Checkpoint protocols proposed in the past are not adequate for …
Checkpoint-recovery protocol for reliable mobile systems
H Higaki, M Takizawa - Proceedings Seventeenth IEEE …, 1998 - ieeexplore.ieee.org
Information systems consist of mobile stations and fixed stations. Mission critical applications
are required to be executed fault-tolerantly in these systems. However, mobile stations …
are required to be executed fault-tolerantly in these systems. However, mobile stations …
A low-cost hybrid coordinated checkpointing protocol for mobile distributed systems
P Kumar - Mobile Information Systems, 2008 - content.iospress.com
Mobile distributed systems raise new issues such as mobility, low bandwidth of wireless
channels, disconnections, limited battery power and lack of reliable stable storage on mobile …
channels, disconnections, limited battery power and lack of reliable stable storage on mobile …
Reliability analysis for various communication schemes in wireless CORBA
X Chen, MR Lyu - IEEE Transactions on Reliability, 2005 - ieeexplore.ieee.org
For the purpose of designing more reliable networks, we extend the traditional reliability
analysis from wired networks to wireless networks with imperfect components. Wireless …
analysis from wired networks to wireless networks with imperfect components. Wireless …
Accelerated heartbeat protocols
MG Gouda, TM McGuire - Proceedings. 18th International …, 1998 - ieeexplore.ieee.org
Heartbeat protocols are used by distributed programs to ensure that if a process in a
program terminates or fails, then the remaining processes in the program terminate. We …
program terminates or fails, then the remaining processes in the program terminate. We …
An efficient optimistic message logging scheme for recoverable mobile computing systems
T Park, N Woo, HY Yeom - IEEE Transactions on mobile …, 2002 - ieeexplore.ieee.org
A number of checkpointing and message logging algorithms have been proposed to support
fault tolerance of mobile computing systems. However, little attention has been paid to the …
fault tolerance of mobile computing systems. However, little attention has been paid to the …
Message logging in mobile computing
B Yao, KF Ssu, WK Fuchs - Digest of Papers. Twenty-Ninth …, 1999 - ieeexplore.ieee.org
Dependable mobile computing is enhanced by independent recovery, low power
consumption and no dependence on stable storage at the mobile host. Existing recovery …
consumption and no dependence on stable storage at the mobile host. Existing recovery …
Quarterware for middleware
We make two observations about communications middleware: first, most middleware are
similar, the differences are in their interfaces and optimizations; second, neither a fixed set of …
similar, the differences are in their interfaces and optimizations; second, neither a fixed set of …
[PDF][PDF] Adaptive checkpointing with storage management for mobile environments
Summary & Conclusions The limited stable storage available in mobile-computing
environments can make traditional checkpointing and message logging umuitable. Since …
environments can make traditional checkpointing and message logging umuitable. Since …