• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,995
Next 10 →

Sender-based message logging

by David B. Johnson , Willy Zwaenepoel
"... Sender-based message logging is a new low-overhead mechanism for providing transparent fault-tolerance in distributed systems. It differs from conventional message logging mechanisms in that each message is logged in volatile memory on the machine from which the message is sent. Keeping the message ..."
Abstract - Cited by 159 (12 self) - Add to MetaCart
Sender-based message logging is a new low-overhead mechanism for providing transparent fault-tolerance in distributed systems. It differs from conventional message logging mechanisms in that each message is logged in volatile memory on the machine from which the message is sent. Keeping the message

Message Logging: Pessimistic, Optimistic, and Causal

by Lorenzo Alvisi, Keith Marzullo - IEEE Transactions on Software Engineering , 1995
"... Message logging protocols are an integral part of a technique for implementing processes that can recover from crash failures. All message logging protocols require that, when recovery is complete, there be no orphan processes, which are surviving processes whose states are inconsistent with the rec ..."
Abstract - Cited by 140 (16 self) - Add to MetaCart
Message logging protocols are an integral part of a technique for implementing processes that can recover from crash failures. All message logging protocols require that, when recovery is complete, there be no orphan processes, which are surviving processes whose states are inconsistent

Message Logging in Mobile Computing

by Bin Yao , Kuo-feng Ssu, W. Kent Fuchs , 1999
"... Dependable mobile computing is enhanced by independent recovery, low power consumption and no dependence on stable storage at the mobile host. Existing recovery protocols proposed for mobile environments typically create consistent global checkpoints that do not guarantee independent recovery and lo ..."
Abstract - Cited by 28 (6 self) - Add to MetaCart
and low power consumption. This paper demonstrates the advantages of message logging by describing a receiver based logging protocol. Checkpointing is utilized to limit log size and recovery latency. We compare the performance of our approach with that of existing mobile checkpointing and recovery

Using Message Logging and Checkpointing

by Checkpointing, David B. Johnson, David Bruce Johnson, S. Cartwright, John E. Dennis, David Bruce Johnson, David Bruce Johnson , 1989
"... Fault tolerance can allow processes executing in a computer system to survive failures within the system. This thesis addresses the theory and practice of transparent faulttolerance methods using message logging and checkpointing in distributed systems. A general model for reasoning about the behavi ..."
Abstract - Add to MetaCart
Fault tolerance can allow processes executing in a computer system to survive failures within the system. This thesis addresses the theory and practice of transparent faulttolerance methods using message logging and checkpointing in distributed systems. A general model for reasoning about

Message Logging in Mobile Computing

by Bin Yaoy, Kuo-feng Ssuz, W. Kent Fuchsy
"... Dependable mobile computing is enhanced by indepen-dent recovery, low power consumption and no dependence on stable storage at the mobile host. Existing recovery pro-tocols proposed for mobile environments typically create consistent global checkpoints that do not guarantee inde-pendent recovery and ..."
Abstract - Add to MetaCart
and low power consumption. This paper demonstrates the advantages of message logging by de-scribing a receiver based logging protocol. Checkpointing is utilized to limit log size and recovery latency. We com-pare the performance of our approach with that of existing mobile checkpointing and recovery

An Efficient Algorithm for Causal Message Logging

by Byoungjoo Lee, Taesoon Park, Heon Y Yeom, Yookun Cho , 1998
"... Causal message logging has many good properties such as nonblocking message logging and no rollback propagation. However, it requires a large amount of information to be piggybacked on each message, which may incur severe performance degradation. This paper presents an efficient causal logging algor ..."
Abstract - Cited by 7 (2 self) - Add to MetaCart
Causal message logging has many good properties such as nonblocking message logging and no rollback propagation. However, it requires a large amount of information to be piggybacked on each message, which may incur severe performance degradation. This paper presents an efficient causal logging

The Cost of Recovery in Message Logging Protocols

by Sriram Rao, Lorenzo Alvisi, Harrick M. Vin , 1998
"... Past research in message logging has focused on studying the relative overhead imposed by pessimistic, optimistic, and causal protocols during failure-free executions. In this paper, we give the first experimental evaluation of the performance of these protocols during recovery. We discover that, if ..."
Abstract - Cited by 37 (3 self) - Add to MetaCart
Past research in message logging has focused on studying the relative overhead imposed by pessimistic, optimistic, and causal protocols during failure-free executions. In this paper, we give the first experimental evaluation of the performance of these protocols during recovery. We discover that

Recovery in Distributed Systems Using Optimistic Message Logging and Checkpointing

by David B Johnson , Willy Zwaenepoel , 1988
"... In a distributed system using message logging and checkpointing to provide fault tolerance, there is always a unique maximum recoverable system state, regardless of the message logging protocol used. The proof of this relies on the observation that the set of system states that have occurred during ..."
Abstract - Cited by 224 (14 self) - Add to MetaCart
In a distributed system using message logging and checkpointing to provide fault tolerance, there is always a unique maximum recoverable system state, regardless of the message logging protocol used. The proof of this relies on the observation that the set of system states that have occurred during

Message Logging Optimization for Wireless Networks

by Bin Yao Kent , 2001
"... This paper describes a message logging optimization that improves performance for failure recovery protocols where messages exchanged between mobile hosts are logged at base stations. The algorithm described and evaluated in this paper does not generate orphan processes in spite of base station fail ..."
Abstract - Add to MetaCart
This paper describes a message logging optimization that improves performance for failure recovery protocols where messages exchanged between mobile hosts are logged at base stations. The algorithm described and evaluated in this paper does not generate orphan processes in spite of base station

A Survey of Rollback-Recovery Protocols in Message-Passing Systems

by E. N. ( Mootaz) Elnozahy, Lorenzo Alvisi, Yi-min Wang, David B. Johnson , 1996
"... this paper, we use the terms event logging and message logging interchangeably ..."
Abstract - Cited by 716 (22 self) - Add to MetaCart
this paper, we use the terms event logging and message logging interchangeably
Next 10 →
Results 1 - 10 of 1,995
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University