A survey of rollback-recovery protocols in message-passing systems
This survey covers rollback-recovery techniques that do not require special language
constructs. In the first part of the survey we classify rollback-recovery protocols into …
constructs. In the first part of the survey we classify rollback-recovery protocols into …
A synchronous checkpointing protocol for mobile distributed systems: probabilistic approach
Coordinated checkpointing is a method that minimises number of processes to checkpoint
for an initiation. It may require blocking of processes, extra synchronisation messages or …
for an initiation. It may require blocking of processes, extra synchronisation messages or …
Low overhead optimal checkpointing for mobile distributed systems
L Kumar, M Mishra, RC Joshi - Proceedings 19th International …, 2003 - ieeexplore.ieee.org
A checkpoint algorithm for a mobile distributed computing system (MDCS) needs to handle
many new issues like: mobility, low bandwidth of wireless channels, lack of stable storage …
many new issues like: mobility, low bandwidth of wireless channels, lack of stable storage …
A low-cost hybrid coordinated checkpointing protocol for mobile distributed systems
P Kumar - Mobile Information Systems, 2008 - content.iospress.com
Mobile distributed systems raise new issues such as mobility, low bandwidth of wireless
channels, disconnections, limited battery power and lack of reliable stable storage on mobile …
channels, disconnections, limited battery power and lack of reliable stable storage on mobile …
A non-intrusive minimum process synchronous checkpointing protocol for mobile distributed systems
Mobile computing raises many new issues, such as lack of stable storage, low bandwidth of
wireless channels, high mobility and limited battery life. These issues make traditional …
wireless channels, high mobility and limited battery life. These issues make traditional …
Message logging in mobile computing
B Yao, KF Ssu, WK Fuchs - Digest of Papers. Twenty-Ninth …, 1999 - ieeexplore.ieee.org
Dependable mobile computing is enhanced by independent recovery, low power
consumption and no dependence on stable storage at the mobile host. Existing recovery …
consumption and no dependence on stable storage at the mobile host. Existing recovery …
[PDF][PDF] A mobility-based checkpointing protocol for mobile computing system
ABSTRACT A new checkpointing and failure recovery algorithm for mobile computing
system is proposed here. Mobile hosts save checkpoints based on mobility and movement …
system is proposed here. Mobile hosts save checkpoints based on mobility and movement …
Decentralized QoS-aware checkpointing arrangement in mobile grid computing
This paper deals with decentralized, QoS-aware middleware for checkpointing arrangement
in Mobile Grid (MoG) computing systems. Checkpointing is more crucial in MoG systems …
in Mobile Grid (MoG) computing systems. Checkpointing is more crucial in MoG systems …
Movement-based checkpointing and logging for recovery in mobile computing systems
SE George, IR Chen, Y ** - Proceedings of the 5th ACM international …, 2006 - dl.acm.org
In this paper, we present an efficient failure recovery scheme for mobile applications based
on movement-based checkpointing and logging. Current approaches take checkpoints …
on movement-based checkpointing and logging. Current approaches take checkpoints …
Rosen: Robust and selective non-repudiation (for tls)
A versatile non-repudiation service that can be used directly and without application-specific
modifications is desirable in many realistic use-cases. Since TLS is one of the most popular …
modifications is desirable in many realistic use-cases. Since TLS is one of the most popular …