Fine: A fully informed and efficient communication-induced checkpointing protocol for distributed systems
Y Luo, D Manivannan - Journal of Parallel and Distributed Computing, 2009 - Elsevier
Communication-Induced Checkpointing (CIC) protocols are classified into two categories in
the literature: Index-based and Model-based. In this paper, we discuss two data structures …
the literature: Index-based and Model-based. In this paper, we discuss two data structures …
Scalable Communication-Induced Checkpointing Protocol with Little Overhead for Distributed Computing Environments
J Ahn - Electronics, 2023 - mdpi.com
The existing communication-induced checkpointing protocols may not scale well due to their
slow acquisition of the most recent timestamps of the next checkpoints of other processes …
slow acquisition of the most recent timestamps of the next checkpoints of other processes …
FNB: Fast non-blocking coordinated checkpointing protocol for distributed systems
Z Abdelhafidi, M Djoudi, N Lagraa… - Theory of Computing …, 2015 - Springer
This paper presents a Fast Non-Blocking coordinated checkpointing protocol for distributed
systems with the aim of minimizing the number of requests and mutable checkpoints while …
systems with the aim of minimizing the number of requests and mutable checkpoints while …
An improved schema of coordinated checkpointing protocol for distributed systems based on popular process
Z Abdelhafidi, M Djoudi… - … on Innovations in …, 2012 - ieeexplore.ieee.org
In this paper, we propose an improved scheme of non-blocking checkpointing algorithm for
distributed systems that minimizes the request number. It is based on piggybacking of …
distributed systems that minimizes the request number. It is based on piggybacking of …
Beyond Big Data--Rethinking Programming Languages for Non-persistent Data
M Kulkarni, YH Lu - … Conference on Cloud Computing and Big …, 2015 - ieeexplore.ieee.org
In" Big Data" research, the data acquired from many sources are fused and analyzed to
obtain valuable and sometimes unexpected information. Even though the volumes of data …
obtain valuable and sometimes unexpected information. Even though the volumes of data …
Communication-Based prevention of non-P-pattern
YW Ci, Z Zhang, DC Zuo, ZB Wu… - 2009 28th IEEE …, 2009 - ieeexplore.ieee.org
An issue pertinent to the design of checkpointing protocols is how to improve the autonomy
of checkpointing and keep computation loss under control. To address the problem, a time …
of checkpointing and keep computation loss under control. To address the problem, a time …
[PDF][PDF] Uma Ponte entre as Abordagens Sıncrona e Quase-sıncrona para Checkpointing
IC Garcia - 2007 - repositorio.unicamp.br
Protocolos de checkpointing sao responsáveis pelo armazenamento de estados dos
processos de um sistema distribuıdo em memória estável para tolerar falhas. Os protocolos …
processos de um sistema distribuıdo em memória estável para tolerar falhas. Os protocolos …