A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Rollback recovery with low overhead for fault tolerance in mobile ad hoc networks
2015
Journal of King Saud University: Computer and Information Sciences
The paper presents a novel rollback recovery protocol for handling the failures of mobile nodes in a MANET using checkpointing and sender based message logging. ...
The technique of checkpointing based rollback recovery has been used effectively for fault tolerance in static and cellular mobile systems; yet, the implementation of existing protocols for MANETs is not ...
This BN, in addition, serves as the host's Checkpoint and log Storage Node (CSN) to save the checkpoint and message log of the MH. ...
doi:10.1016/j.jksuci.2014.03.022
fatcat:kzkrgzxpxbgtblay3lknmfm35e
SQL statement logging for making SQLite truly lite
2017
Proceedings of the VLDB Endowment
and perfect fit for SQLite-based mobile applications. ...
SQL Statement Logging for Making SQLite Truly Lite. PVLDB, 11(4): xxxxyyyy, 2017. ...
We would like to thank the anonymous PVLDB reviewers for valuable comments which helped to improve the paper. ...
doi:10.1145/3186728.3164146
fatcat:axr6myrlsrdldpvyw673ku2ami
Resilience of Stateful IoT Applications in a Dynamic Fog Environment
2018
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services - MobiQuitous '18
However, these end devices have low stability and are prone to failures. There is consequently a need for failure management protocols for IoT applications in the Fog. ...
Data stored during the state saving process are used for recovery, taking into account consistency with respect to the physical world. ...
After a successful checkpoint, all previous checkpoints, message logs and function call records of the entity are purged. ...
doi:10.1145/3286978.3287007
dblp:conf/mobiquitous/OzeerELOSV18
fatcat:afbqlsqsrbbsbpgiqynzm3evna
Live Migration of Virtual Machine and Container based Mobile Core Network Components: A Comprehensive Study
2021
IEEE Access
With the increasing demand for openness, flexibility, and monetization the Network Function Virtualization (NFV) of mobile network functions has become the embracing factor for most mobile network operators ...
Virtualization platforms of interest include both Virtual Machines (VMs) and Containers, with the latter option offering more lightweight characteristics. ...
If the repair mode is enabled for a socket, • during the checkpoint process at the source node, the SCTP socket is closed at the source node without initiating the SCTP_SHUTDOWN or ABORT message; • during ...
doi:10.1109/access.2021.3099370
fatcat:p6ohh4nhhbfjlceicg3esqs77y
Lazy garbage collection of recovery state for fault-tolerant distributed shared memory
2002
IEEE Transactions on Parallel and Distributed Systems
We devise two algorithms for garbage collection of checkpoints and logs, checkpoint garbage collection (CGC), and lazy log trimming (LLT). ...
Evaluation results for real applications show that it effectively bounds the number of past checkpoints to be retained and the size of the logs in stable storage. ...
The authors also thank Murali Rangarajan for insights into protocol and application behavior, and for all the help with the experimental part. ...
doi:10.1109/tpds.2002.1019857
fatcat:l6azt7ve7vftlfdoi3q76uppke
Lazy garbage collection of recovery state for fault-tolerant distributed shared memory
2002
IEEE Transactions on Parallel and Distributed Systems
We devise two algorithms for garbage collection of checkpoints and logs, checkpoint garbage collection (CGC), and lazy log trimming (LLT). ...
Evaluation results for real applications show that it effectively bounds the number of past checkpoints to be retained and the size of the logs in stable storage. ...
The authors also thank Murali Rangarajan for insights into protocol and application behavior, and for all the help with the experimental part. ...
doi:10.1109/tpds.2002.1041885
fatcat:vewca4pfwjd57lfg3ciwhktno4
On the design of perturbation-resilient atomic commit protocols for mobile transactions
2011
ACM Transactions on Computer Systems
This is challenging as mobile environments are typically characterized by frequent perturbations such as network disconnections and node failures. ...
On the other hand frequent node and link failures complicate the design of atomic commit protocols by increasing both the transaction abort rate and resource blocking time. ...
The combination of both (often used in databases) uses both checkpoint and recovery logs and proceeds as follows: (a) take a checkpoint and delete old log and start new log, (b) log all significant messages ...
doi:10.1145/2003690.2003691
fatcat:frap5kgxzvaivm5ndhso6evjbm
Virtual Sender-based Message Logging for Large-scale Ubiquitous Sensor Network Systems
2014
International Journal of Multimedia and Ubiquitous Engineering
memory of its sender as storage for logging. ...
This paper presents a scalable virtual senderbased message logging algorithm to solve this problem by enabling the broker elected in a group of nodes as virtual sender to localize both of the logging and ...
In the remainder of this paper, the messages applications generate are called application messages and the messages used for the message logging and recovery procedures, control messages. ...
doi:10.14257/ijmue.2014.9.5.04
fatcat:wcrdxlffrndlhf33edmsrjgjzy
MobiStreams: A Reliable Distributed Stream Processing System for Mobile Devices
2014
2014 IEEE 28th International Parallel and Distributed Processing Symposium
MobiStreams tackles these challenges through two new techniques: 1) tokentriggered checkpointing, and 2) broadcast-based checkpointing. ...
Yet, existing applications rely predominantly on a client-server computing paradigm, using phones only as thin clients, sending sensed information via the cellular network to servers for processing. ...
The controller is lightweight -it is used only for control purposes and is not involved in any data transmission between phones. ...
doi:10.1109/ipdps.2014.17
dblp:conf/ipps/WangP14
fatcat:64pcnhccijftpbqlm5cukw4fcm
Software-Defined Edge Cloud Framework for Resilient Multitenant Applications
2019
Wireless Communications and Mobile Computing
Specifically, we propose building a software platform to manage the distributed edge nodes along with support services to deploy and launch isolated and multitenant user applications through a lightweight ...
The cluster of geo-distributed and wireless edge nodes not only power multitenant IoT applications that are closer to the data source and the user, but also enable developers to remotely deploy and orchestrate ...
Acknowledgments The work presented in this paper is funded by Cisco Systems and National Science Foundation under Grant No. CNS 1637371. ...
doi:10.1155/2019/3947286
fatcat:sig3a3f4w5aztajo4mkamyqqgq
Group monitoring in mobile wireless sensor networks
2011
2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS)
At one extreme, group membership information is proactively and collectively maintained by each node in the group. ...
We compare our solutions through simulation of synthetic scenarios and real-world mobility traces of humans. ...
ACKNOWLEDGMENTS The work described in this paper was partially supported by the Autonomous Province of Trento under the call for proposals "Major Projects 2006" (project ACUBE) and by the EU Cooperating ...
doi:10.1109/dcoss.2011.5982168
dblp:conf/dcoss/CattaniGP11
fatcat:7k7kpccpyzd73looufdvlcg4du
Census: Fast, scalable and robust data aggregation in MANETs
[article]
2015
arXiv
pre-print
The protocol is structure-free so as to avoid high messaging overhead for maintaining structure in the presence of node mobility. ...
Census thus achieves a cover time of O(N/k) and message overhead of O(Nlog(N)/k) where N is the number of nodes and k the number of tokens in the network. ...
The curve for local-bias token messages and the gradient setup messages grow as log(N ), indicating a N log(N ) messaging overhead. ...
arXiv:1409.7368v2
fatcat:gnsg5veh5ffd5kmtidt3uzyse4
The Architecture of the XtreemOS Grid Checkpointing Service
[chapter]
2009
Lecture Notes in Computer Science
The latter may spawn millions of grid nodes using different system-specific checkpointers saving and restoring application and kernel data structures on a grid node. ...
XtreemOS uses an integrated grid checkpointing service (XtreemGCP) for implementing migration and fault tolerance. ...
Future work includes implementation of adaptive checkpointing mechanisms, uncoordinated checkpointing strategies, and integration of the announced kernel checkpointer for the Linux mainstream. ...
doi:10.1007/978-3-642-03869-3_42
fatcat:n3ciu7huwrhzjok43mudcxvjky
Decentralized QoS-Aware Checkpointing Arrangement in Mobile Grid Computing
2010
IEEE Transactions on Mobile Computing
With ReD, an MH (mobile host) simply sends its checkpointed data to one selected neighboring MH, and also serves as a stable point of storage for checkpointed data received from a single approved neighboring ...
This paper deals with decentralized, QoS-aware middleware for checkpointing arrangement in Mobile Grid (MoG) computing systems. ...
Also, a method for reliable message logging has been suggested [27] , where each MH client communicates with the BS through a proxy for checkpointed data storage, masking crashes. ...
doi:10.1109/tmc.2010.80
fatcat:qffzqh4msrcpjmsj4schffojti
PTIMEHighly scalable OLTP DBMS for Managing Update-Intensive Stream Workload
[chapter]
2004
Proceedings 2004 VLDB Conference
Its storage engine layer incorporates our previous innovations for exploiting engine-level microparallelism such as differential logging and optimistic latch-free index traversal concurrency control protocol ...
Over the past thirty years since the system R and Ingres projects started to lay the foundation for today's RDBMS implementations, the underlying hardware and software platforms have changed dramatically ...
They also thank other members of P*TIME development team for their contribution. ...
doi:10.1016/b978-012088469-8/50090-5
fatcat:cmwor2oco5gbvmxd6pojnmyojm
« Previous
Showing results 1 — 15 out of 573 results