A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A PROTOCOL FOR CONSISTENT CHECKPOINTING RECOVERY FOR TIME-CRITICAL DISTRIBUTED DATABASE SYSTEMS
1993
Database Systems for Advanced Applications '93
Since our scheme does not interfere with the normal transaction processing, the scheme is essential for time-critical distributed database systems. ...
The state of the database taken as a checkpoint by all sites in the system is consistent, so that fast recovery from media failures can be performed. ...
GCP(t) must be consistent in order for the system to restore the correct database state on recovery from a media failure. ...
doi:10.1142/9789814503730_0026
fatcat:swtmcbxyyjg4pmj6fzwct743mq
A Survey on Data and Transaction Management in Mobile Databases
2012
International Journal of Database Management Systems
This leads to many interesting problems in mobile database research and Mobile Database has become a fertile land for many researchers. ...
Query Processing, Recovery and Security. ...
In [64] , Rachit Garg et al. present a survey of some checkpointing algorithms for distributed systems. ...
doi:10.5121/ijdms.2012.4501
fatcat:hz6dj72yrzev3cvfdqkphlmmci
Distributed Checkpointing for Globally Consistent States of Databases
1989
IEEE Transactions on Software Engineering
In this paper, 8 new algorithm for checkpointing in distributed database systems is proposed and its correctness is proved, The practicality of the algorithm is discussed by analyzing the extra workload ...
Abstmcf-The goal of checkpointing in database management systems is to save database slates on a separate secure device so that the database can be recovered when errors and fallures occur. ...
Quick recovery from failures is critical for some applications of distributed database systems which require high availability (e.g., ballistic. missile defense or air traffic control). ...
doi:10.1109/tse.1989.559763
fatcat:buy72tfltvgwffxfwjpucmucca
Unification of transactions and replication in three-tier architectures based on CORBA
2005
IEEE Transactions on Dependable and Secure Computing
A remaining issue to be resolved is how to avoid critical runs during recovery. ...
If applicationcontrolled consistency is chosen, the application is respon sible for checkpointing, logging, activation and recovery, and for maintaining whatever kind of consistency is appropriate for ...
doi:10.1109/tdsc.2005.14
fatcat:cayvotayjfdrnoaoqcdqanktyi
The Impacts of Write-Through Procedures and Checkpointing on Real-Time Concurrency Control
2003
Computer journal
In this paper, we study the impacts of checkpointing and write-through procedures, which are critical in maintaining database recoverability and transaction durability, on the performance of a well-known ...
real-time concurrency control protocol, the Read/Write Priority Ceiling Protocol (RWPCP). ...
Although a lot of research works have been done on logging and recovery for traditional database systems, little work has explored logging and recovery for real-time database systems [21, 22] . ...
doi:10.1093/comjnl/46.2.174
fatcat:peammcsfifacfnjceivu2xcpga
Database Recovery Technique for Mobile Computing: A Game Theory Approach
2022
Computers Materials & Continua
Several of the presented recovery protocols are chosen and evaluated in order to determine the most critical factors affecting the recovery mechanism, such as the number of processes, the time required ...
Contact between mobile hosts and database servers presents many problems in the Mobile Database System (MDS). ...
Funding Statement: The authors received no specific funding for this study.
Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study. ...
doi:10.32604/cmc.2022.019440
fatcat:57sxl6hlmjc5hal4kfbvcbo4ky
SafetyNet
2002
SIGARCH Computer Architecture News
recovers to a pre-fault checkpoint of the system and re-executes if a fault is detected. ...
SafetyNet efficiently coordinates checkpoints across the system in logical time and uses "logically atomic" coherence transactions to free checkpoints of transient coherence state. ...
For our system with directory-based coherence, we use a loosely synchronous (in physical time) checkpoint clock that is distributed redundantly to ensure no single point of failure. ...
doi:10.1145/545214.545229
fatcat:v36napeoavbmnlga7rjyapyopa
Fault Tolerance and High Availability in Data Stream Management Systems
[chapter]
2017
Encyclopedia of Database Systems
Traditionally, availability has been defined as the fraction of time that a system remains operational and properly services requests. ...
SYNONYMS None DEFINITION Just like any other software system, a data stream management system (DSMS) can experience failures of its different components. ...
This property is important for critical monitoring tasks such as intrusion detection that require low-latency results at all times. The second general approach is known as rollback recovery [4] . ...
doi:10.1007/978-1-4899-7993-3_160-2
fatcat:6ak4ot47mfhfpek7xkuz5dgutq
Page 506 of IEEE Transactions on Computers Vol. 52, Issue 4
[page]
2003
IEEE Transactions on Computers
not only associates each client-side system with a consistent database image for local processing, of read-only transac-
tions, but also provides an efficient recovery mechanism
Published by the IEEE Computer ...
The 2VPCP protocol is, then extended to a distributed environment to process read-only at
system can not only significantly boost the response time ol
59
transactions client-side systems locally. ...
Fast and transparent recovery for continuous availability of cluster-based servers
2006
Proceedings of the eleventh ACM SIGPLAN symposium on Principles and practice of parallel programming - PPoPP '06
We present results using a working, 16-processor system that achieves subsecond failure reconfiguration times. ...
Besides maintaining system state consistent after a failure, one of the main challenges in achieving continuous operation is to provide fast reconfiguration. ...
Acknowledgments We thank the anonymous reviewers for their comments and Reza Azimi for his help with VMMC. ...
doi:10.1145/1122971.1123005
dblp:conf/ppopp/ChristodoulopoulouMBA06
fatcat:xkgy5g5r6nbprngkivmrxxnwey
Analysis of Recent Checkpointing Techniques for Mobile Computing Systems
[article]
2011
arXiv
pre-print
To add reliability and high availability to such distributed systems, checkpoint based rollback recovery is one of the widely used techniques for applications such as scientific computing, database, telecommunication ...
Checkpoint is defined as a designated place in a program where normal processing of a system is interrupted to preserve the status information. ...
Awasthi and Kumar [21] proposed a synchronous checkpointing protocol for mobile distributed systems. ...
arXiv:1108.6195v1
fatcat:y7gc76fjnrclhmz5thdrmabbv4
Fault-Tolerance and High Availability in Data Stream Management Systems
[chapter]
2009
Encyclopedia of Database Systems
Traditionally, availability has been defined as the fraction of time that a system remains operational and properly services requests. ...
SYNONYMS None DEFINITION Just like any other software system, a data stream management system (DSMS) can experience failures of its different components. ...
This property is important for critical monitoring tasks such as intrusion detection that require low-latency results at all times. The second general approach is known as rollback recovery [4] . ...
doi:10.1007/978-0-387-39940-9_160
fatcat:urb74zfsjnc6tnz3y76r3jwwgi
A Survey of Fault-Tolerance and Fault-Recovery Techniques in Parallel Systems
[article]
2005
arXiv
pre-print
These systems, like any distributed system, can have large numbers of independent hardware components cooperating or collaborating on a computation. ...
Supercomputing systems today often come in the form of large numbers of commodity systems linked together into a computing cluster. ...
Fault tolerance solutions can be implemented in a variety of forms. ...
arXiv:cs/0501002v1
fatcat:qeim2kmwvbhv3fvbizs3bdmmcy
Comparing Distributed Online Stream Processing Systems Considering Fault Tolerance Issues
2014
Journal of Emerging Technologies in Web Intelligence
The work describes some of the main strategies for fault tolerance -replication components, upstream backup, checkpoint and recovery -and shows how each of the four systems uses these strategies. ...
We use this sort of system for processing of data streams that can come from different sources such as web sites, sensors, mobile phones or any set of devices that provide real-time high-speed data. ...
by a replicated high available data storage systems, such as BigTable (a distributed storage system) or Spanner (a distributed database). ...
doi:10.4304/jetwi.6.2.174-179
fatcat:b2xpfdedmfdjhmjbsat43vj7ha
Towards Zero-Delay Recovery of Agents in Production Automation Systems
2009
2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology
Multi-agent systems (MAS) is an accepted paradigm in safety-critical systems, like the production automation. ...
Nevertheless, as any other distributed system MAS are prone to failures as well, and consequently an agent may crash. ...
In case of coordinated checkpoints [12] , a consistent set of checkpoints forms a recovery line so that all agents can roll back to a consistent global state. ...
doi:10.1109/wi-iat.2009.170
dblp:conf/iat/KuhnMLS09
fatcat:36fbigl6pngqbliv2ewnbcenru
« Previous
Showing results 1 — 15 out of 4,222 results