Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Software (D) > Operating Systems (D.4) > Reliability (D.4.5) > Checkpoint/Restart (D.4.5...)  
 
Options:
 
  1-6 of 6 Reviews about "Checkpoint/Restart (D.4.5...)": Date Reviewed
  Recovery-Oriented Computing: Building Multitier Dependability
Candea G., Brown A., Fox A., Patterson D. Computer 37(11): 60-67, 2004.  Type: Article

High uptimes for business critical applications are essential in today’s business environment, which demands 24/7 availability. Recovery-oriented computing takes an interesting approach to providing recovery mechanisms that o...

Jun 22 2005
  A causal message logging protocol for mobile nodes in mobile computing systems
Ahn J., Min S., Hwang C. Future Generation Computer Systems 20(4): 663-686, 2004.  Type: Article

Ahn, Min, and Hwang propose a causal message logging protocol, with independent checkpointing, that addresses the constraints of mobile nodes, such as disconnection, limited power, small storage space, and low bandwidth....

Feb 23 2005
  Cherry: checkpointed early resource recycling in out-of-order microprocessors
Martínez J., Renau J., Huang M., Prvulovic M., Torrellas J.  Microarchitecture (Proceedings of the 35th annual ACM/IEEE international symposium, Istanbul, Turkey, Nov 18-22, 2002) 3-14, 2002.  Type: Proceedings

A proposal to combine previous techniques to make better use of resources (registers) in superscalar processors, based on early recycling, is presented in this paper. This new technique was tested on both a load/store queue and reorder...

Jan 7 2004
  A survey of rollback-recovery protocols in message-passing systems
Elnozahy E., Alvisi L., Wang Y., Johnson D. ACM Computing Surveys 34(3): 375-408, 2002.  Type: Article

Computer applications now span the globe, and incorporate devices ranging in size and power from watches to clustered supercomputers. The further a system reaches, and the more its heterogeneity increases, the more fragile (susceptible...

Oct 28 2003
  Checkpointing and rollback-recovery for distributed systems
Koo R., Toueg S. IEEE Transactions on Software Engineering 13(1): 23-31, 1987.  Type: Article

The general-purpose algorithms for checkpointing and recovery presented in this paper provide several advances over other distributed rollback methods. First, the model is simple and general. Processes communicate only by messages sent...

Nov 1 1987
  Analysis of a class of recovery procedures
Koren I., Koren Z., Su S. IEEE Transactions on Computers 35(9): 703-712, 1986.  Type: Article

The authors analyze a class of recovery procedures involving time redundancy in the form of instruction retries and program rollbacks. The parameters of each procedure are determined so that the system’s operation can be opti...

Jul 1 1987
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy