Filters








4,222 Hits in 7.0 sec

A PROTOCOL FOR CONSISTENT CHECKPOINTING RECOVERY FOR TIME-CRITICAL DISTRIBUTED DATABASE SYSTEMS

Junguk L. Kim, Taesoon Park, Prabaharan I. Swarnam, Myung-Joon Kim
1993 Database Systems for Advanced Applications '93  
Since our scheme does not interfere with the normal transaction processing, the scheme is essential for time-critical distributed database systems.  ...  The state of the database taken as a checkpoint by all sites in the system is consistent, so that fast recovery from media failures can be performed.  ...  GCP(t) must be consistent in order for the system to restore the correct database state on recovery from a media failure.  ... 
doi:10.1142/9789814503730_0026 fatcat:swtmcbxyyjg4pmj6fzwct743mq

A Survey on Data and Transaction Management in Mobile Databases

D Roselin Selvarani
2012 International Journal of Database Management Systems  
This leads to many interesting problems in mobile database research and Mobile Database has become a fertile land for many researchers.  ...  Query Processing, Recovery and Security.  ...  In [64] , Rachit Garg et al. present a survey of some checkpointing algorithms for distributed systems.  ... 
doi:10.5121/ijdms.2012.4501 fatcat:hz6dj72yrzev3cvfdqkphlmmci

Distributed Checkpointing for Globally Consistent States of Databases

Sang Hyuk Son, A.K. Agrawala
1989 IEEE Transactions on Software Engineering  
In this paper, 8 new algorithm for checkpointing in distributed database systems is proposed and its correctness is proved, The practicality of the algorithm is discussed by analyzing the extra workload  ...  Abstmcf-The goal of checkpointing in database management systems is to save database slates on a separate secure device so that the database can be recovered when errors and fallures occur.  ...  Quick recovery from failures is critical for some applications of distributed database systems which require high availability (e.g., ballistic. missile defense or air traffic control).  ... 
doi:10.1109/tse.1989.559763 fatcat:buy72tfltvgwffxfwjpucmucca

Unification of transactions and replication in three-tier architectures based on CORBA

Wenbing Zhao, L.E. Moser, P.M. Melliar-Smith
2005 IEEE Transactions on Dependable and Secure Computing  
A remaining issue to be resolved is how to avoid critical runs during recovery.  ...  If applicationcontrolled consistency is chosen, the application is respon sible for checkpointing, logging, activation and recovery, and for maintaining whatever kind of consistency is appropriate for  ... 
doi:10.1109/tdsc.2005.14 fatcat:cayvotayjfdrnoaoqcdqanktyi

The Impacts of Write-Through Procedures and Checkpointing on Real-Time Concurrency Control

T.-W. Kuo
2003 Computer journal  
In this paper, we study the impacts of checkpointing and write-through procedures, which are critical in maintaining database recoverability and transaction durability, on the performance of a well-known  ...  real-time concurrency control protocol, the Read/Write Priority Ceiling Protocol (RWPCP).  ...  Although a lot of research works have been done on logging and recovery for traditional database systems, little work has explored logging and recovery for real-time database systems [21, 22] .  ... 
doi:10.1093/comjnl/46.2.174 fatcat:peammcsfifacfnjceivu2xcpga

Database Recovery Technique for Mobile Computing: A Game Theory Approach

Magda M. Madbouly, Yasser F. Mokhtar, Saad M. Darwish
2022 Computers Materials & Continua  
Several of the presented recovery protocols are chosen and evaluated in order to determine the most critical factors affecting the recovery mechanism, such as the number of processes, the time required  ...  Contact between mobile hosts and database servers presents many problems in the Mobile Database System (MDS).  ...  Funding Statement: The authors received no specific funding for this study. Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.  ... 
doi:10.32604/cmc.2022.019440 fatcat:57sxl6hlmjc5hal4kfbvcbo4ky

SafetyNet

Daniel J. Sorin, Milo M. K. Martin, Mark D. Hill, David A. Wood
2002 SIGARCH Computer Architecture News  
recovers to a pre-fault checkpoint of the system and re-executes if a fault is detected.  ...  SafetyNet efficiently coordinates checkpoints across the system in logical time and uses "logically atomic" coherence transactions to free checkpoints of transient coherence state.  ...  For our system with directory-based coherence, we use a loosely synchronous (in physical time) checkpoint clock that is distributed redundantly to ensure no single point of failure.  ... 
doi:10.1145/545214.545229 fatcat:v36napeoavbmnlga7rjyapyopa

Fault Tolerance and High Availability in Data Stream Management Systems [chapter]

Magdalena Balazinska, Jeong-Hyon Hwang, Mehul A. Shah
2017 Encyclopedia of Database Systems  
Traditionally, availability has been defined as the fraction of time that a system remains operational and properly services requests.  ...  SYNONYMS None DEFINITION Just like any other software system, a data stream management system (DSMS) can experience failures of its different components.  ...  This property is important for critical monitoring tasks such as intrusion detection that require low-latency results at all times. The second general approach is known as rollback recovery [4] .  ... 
doi:10.1007/978-1-4899-7993-3_160-2 fatcat:6ak4ot47mfhfpek7xkuz5dgutq

Page 506 of IEEE Transactions on Computers Vol. 52, Issue 4 [page]

2003 IEEE Transactions on Computers  
not only associates each client-side system with a consistent database image for local processing, of read-only transac- tions, but also provides an efficient recovery mechanism Published by the IEEE Computer  ...  The 2VPCP protocol is, then extended to a distributed environment to process read-only at system can not only significantly boost the response time ol 59 transactions client-side systems locally.  ... 

Fast and transparent recovery for continuous availability of cluster-based servers

Rosalia Christodoulopoulou, Kaloian Manassiev, Angelos Bilas, Cristiana Amza
2006 Proceedings of the eleventh ACM SIGPLAN symposium on Principles and practice of parallel programming - PPoPP '06  
We present results using a working, 16-processor system that achieves subsecond failure reconfiguration times.  ...  Besides maintaining system state consistent after a failure, one of the main challenges in achieving continuous operation is to provide fast reconfiguration.  ...  Acknowledgments We thank the anonymous reviewers for their comments and Reza Azimi for his help with VMMC.  ... 
doi:10.1145/1122971.1123005 dblp:conf/ppopp/ChristodoulopoulouMBA06 fatcat:xkgy5g5r6nbprngkivmrxxnwey

Analysis of Recent Checkpointing Techniques for Mobile Computing Systems [article]

Ruchi Tuli, Parveen Kumar
2011 arXiv   pre-print
To add reliability and high availability to such distributed systems, checkpoint based rollback recovery is one of the widely used techniques for applications such as scientific computing, database, telecommunication  ...  Checkpoint is defined as a designated place in a program where normal processing of a system is interrupted to preserve the status information.  ...  Awasthi and Kumar [21] proposed a synchronous checkpointing protocol for mobile distributed systems.  ... 
arXiv:1108.6195v1 fatcat:y7gc76fjnrclhmz5thdrmabbv4

Fault-Tolerance and High Availability in Data Stream Management Systems [chapter]

Susan Dumais, Magdalena Balazinska, Jeong-Hyon Hwang, Mehul A. Shah, Raimondo Schettini, Gianluigi Ciocca, Isabella Gagliardi, Manoranjan Dash, Poon Wei Koot, Benjamin Bustos, Tobias Schreck, Vassilis Plachouras (+37 others)
2009 Encyclopedia of Database Systems  
Traditionally, availability has been defined as the fraction of time that a system remains operational and properly services requests.  ...  SYNONYMS None DEFINITION Just like any other software system, a data stream management system (DSMS) can experience failures of its different components.  ...  This property is important for critical monitoring tasks such as intrusion detection that require low-latency results at all times. The second general approach is known as rollback recovery [4] .  ... 
doi:10.1007/978-0-387-39940-9_160 fatcat:urb74zfsjnc6tnz3y76r3jwwgi

A Survey of Fault-Tolerance and Fault-Recovery Techniques in Parallel Systems [article]

Michael Treaster
2005 arXiv   pre-print
These systems, like any distributed system, can have large numbers of independent hardware components cooperating or collaborating on a computation.  ...  Supercomputing systems today often come in the form of large numbers of commodity systems linked together into a computing cluster.  ...  Fault tolerance solutions can be implemented in a variety of forms.  ... 
arXiv:cs/0501002v1 fatcat:qeim2kmwvbhv3fvbizs3bdmmcy

Comparing Distributed Online Stream Processing Systems Considering Fault Tolerance Issues

André Leon Sampaio Gradvohl, Hermes Senger, Luciana Arantes, Pierre Sens
2014 Journal of Emerging Technologies in Web Intelligence  
The work describes some of the main strategies for fault tolerance -replication components, upstream backup, checkpoint and recovery -and shows how each of the four systems uses these strategies.  ...  We use this sort of system for processing of data streams that can come from different sources such as web sites, sensors, mobile phones or any set of devices that provide real-time high-speed data.  ...  by a replicated high available data storage systems, such as BigTable (a distributed storage system) or Spanner (a distributed database).  ... 
doi:10.4304/jetwi.6.2.174-179 fatcat:b2xpfdedmfdjhmjbsat43vj7ha

Towards Zero-Delay Recovery of Agents in Production Automation Systems

Eva Kuhn, Richard Mordinyi, Mario Lang, Adnan Selimovic
2009 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology  
Multi-agent systems (MAS) is an accepted paradigm in safety-critical systems, like the production automation.  ...  Nevertheless, as any other distributed system MAS are prone to failures as well, and consequently an agent may crash.  ...  In case of coordinated checkpoints [12] , a consistent set of checkpoints forms a recovery line so that all agents can roll back to a consistent global state.  ... 
doi:10.1109/wi-iat.2009.170 dblp:conf/iat/KuhnMLS09 fatcat:36fbigl6pngqbliv2ewnbcenru
« Previous Showing results 1 — 15 out of 4,222 results