Search
for Topics
All Reviews
Browse All Reviews
>
Software (D)
>
Operating Systems (D.4)
>
Reliability (D.4.5)
> Checkpoint/Restart (D.4.5...)
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
1-6 of 6 Reviews about "
Checkpoint/Restart (D.4.5...)
":
Date Reviewed
Recovery-Oriented Computing: Building Multitier Dependability
Candea G., Brown A., Fox A., Patterson D. Computer 37(11): 60-67, 2004. Type: Article
High uptimes for business critical applications are essential in today’s business environment, which demands 24/7 availability. Recovery-oriented computing takes an interesting approach to providing recovery mechanisms that o...
Jun 22 2005
A causal message logging protocol for mobile nodes in mobile computing systems
Ahn J., Min S., Hwang C. Future Generation Computer Systems 20(4): 663-686, 2004. Type: Article
Ahn, Min, and Hwang propose a causal message logging protocol, with independent checkpointing, that addresses the constraints of mobile nodes, such as disconnection, limited power, small storage space, and low bandwidth....
Feb 23 2005
Cherry: checkpointed early resource recycling in out-of-order microprocessors
Martínez J., Renau J., Huang M., Prvulovic M., Torrellas J. Microarchitecture (Proceedings of the 35th annual ACM/IEEE international symposium, Istanbul, Turkey, Nov 18-22, 2002) 3-14, 2002. Type: Proceedings
A proposal to combine previous techniques to make better use of resources (registers) in superscalar processors, based on early recycling, is presented in this paper. This new technique was tested on both a load/store queue and reorder...
Jan 7 2004
A survey of rollback-recovery protocols in message-passing systems
Elnozahy E., Alvisi L., Wang Y., Johnson D. ACM Computing Surveys 34(3): 375-408, 2002. Type: Article
Computer applications now span the globe, and incorporate devices ranging in size and power from watches to clustered supercomputers. The further a system reaches, and the more its heterogeneity increases, the more fragile (susceptible...
Oct 28 2003
Checkpointing and rollback-recovery for distributed systems
Koo R., Toueg S. IEEE Transactions on Software Engineering 13(1): 23-31, 1987. Type: Article
The general-purpose algorithms for checkpointing and recovery presented in this paper provide several advances over other distributed rollback methods. First, the model is simple and general. Processes communicate only by messages sent...
Nov 1 1987
Analysis of a class of recovery procedures
Koren I., Koren Z., Su S. IEEE Transactions on Computers 35(9): 703-712, 1986. Type: Article
The authors analyze a class of recovery procedures involving time redundancy in the form of instruction retries and program rollbacks. The parameters of each procedure are determined so that the system’s operation can be opti...
Jul 1 1987
Display
5
10
15
25
50
100
per page
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy