A survey of rollback-recovery protocols in message-passing systems

EN Elnozahy, L Alvisi, YM Wang… - ACM Computing Surveys …, 2002 - dl.acm.org
This survey covers rollback-recovery techniques that do not require special language
constructs. In the first part of the survey we classify rollback-recovery protocols into …

A synchronous checkpointing protocol for mobile distributed systems: probabilistic approach

LK Awasthi, P Kumar - International Journal of Information …, 2007 - inderscienceonline.com
Coordinated checkpointing is a method that minimises number of processes to checkpoint
for an initiation. It may require blocking of processes, extra synchronisation messages or …

Low overhead optimal checkpointing for mobile distributed systems

L Kumar, M Mishra, RC Joshi - Proceedings 19th International …, 2003 - ieeexplore.ieee.org
A checkpoint algorithm for a mobile distributed computing system (MDCS) needs to handle
many new issues like: mobility, low bandwidth of wireless channels, lack of stable storage …

A low-cost hybrid coordinated checkpointing protocol for mobile distributed systems

P Kumar - Mobile Information Systems, 2008 - content.iospress.com
Mobile distributed systems raise new issues such as mobility, low bandwidth of wireless
channels, disconnections, limited battery power and lack of reliable stable storage on mobile …

A non-intrusive minimum process synchronous checkpointing protocol for mobile distributed systems

P Kumar, L Kumar, RK Chauhan… - 2005 IEEE International …, 2005 - ieeexplore.ieee.org
Mobile computing raises many new issues, such as lack of stable storage, low bandwidth of
wireless channels, high mobility and limited battery life. These issues make traditional …

Message logging in mobile computing

B Yao, KF Ssu, WK Fuchs - Digest of Papers. Twenty-Ninth …, 1999 - ieeexplore.ieee.org
Dependable mobile computing is enhanced by independent recovery, low power
consumption and no dependence on stable storage at the mobile host. Existing recovery …

[PDF][PDF] A mobility-based checkpointing protocol for mobile computing system

S Biswas, S Neogy - International Journal of Computer Science & …, 2010 - academia.edu
ABSTRACT A new checkpointing and failure recovery algorithm for mobile computing
system is proposed here. Mobile hosts save checkpoints based on mobility and movement …

Decentralized QoS-aware checkpointing arrangement in mobile grid computing

PJD Darby III, NF Tzeng - IEEE transactions on mobile …, 2010 - ieeexplore.ieee.org
This paper deals with decentralized, QoS-aware middleware for checkpointing arrangement
in Mobile Grid (MoG) computing systems. Checkpointing is more crucial in MoG systems …

Movement-based checkpointing and logging for recovery in mobile computing systems

SE George, IR Chen, Y ** - Proceedings of the 5th ACM international …, 2006 - dl.acm.org
In this paper, we present an efficient failure recovery scheme for mobile applications based
on movement-based checkpointing and logging. Current approaches take checkpoints …

Rosen: Robust and selective non-repudiation (for tls)

S Capkun, E Ozturk, G Tsudik, K Wüst - … of the 2021 on Cloud Computing …, 2021 - dl.acm.org
A versatile non-repudiation service that can be used directly and without application-specific
modifications is desirable in many realistic use-cases. Since TLS is one of the most popular …