1,320 Hits in 4.7 sec

Using Adaptive Agents for the Fault-Tolerant Mobile Computing System [chapter]

Taesoon Park, Jaehwan Youn, Dongryung Kim
2006 Lecture Notes in Computer Science  
The agents try to keep the failure-recovery cost and the failure-free operation cost within a certain level, regardless of the handoff frequency of the mobile hosts.  ...  The mobility of the agent is suitable to trace the mobile hosts in the system and the intelligence of the agent makes it efficient to support the fault-tolerance services.  ...  The others are mobile agents, called the checkpointing agent (CPA) and the log agent (LGA), each of which manages and makes the migration decision of the latest checkpoint and the message logs, respectively  ... 
doi:10.1007/11758532_105 fatcat:qjrnhcl36zfkjpiu7vqdklaoh4

Log Management support for recovery in mobile computing Environment [article]

J.C. Miraclin Joyce Pamila, K. Thanushkodi
2009 arXiv   pre-print
Thus considering challenges in wireless mobile networks, a new log management scheme is proposed for recovery of mobile transactions.  ...  The proposed scheme is compared with the existing Lazy and Pessimistic scheme and a trade off analysis between the cost invested to manage log and the return of investment in terms of improved failure  ...  CONCLUSION The proposed log management scheme for mobile computing system reduces total cost for recovery from the failure when compared with the existing Lazy and pessimistic schemes.  ... 
arXiv:0908.0076v1 fatcat:rch3kblphfaxhb4lhzmfgl7xcy

Database Recovery Technique for Mobile Computing: A Game Theory Approach

Magda M. Madbouly, Yasser F. Mokhtar, Saad M. Darwish
2022 Computers Materials & Continua  
Contact between mobile hosts and database servers presents many problems in the Mobile Database System (MDS).  ...  to deliver messages, and the number of messages logged-in time.  ...  Funding Statement: The authors received no specific funding for this study. Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.  ... 
doi:10.32604/cmc.2022.019440 fatcat:57sxl6hlmjc5hal4kfbvcbo4ky

Movement-based checkpointing and logging for recovery in mobile computing systems

Sapna E. George, Ing-Ray Chen, Ying Jin
2006 Proceedings of the 5th ACM international workshop on Data engineering for wireless and mobile access - MobiDE '06  
In this paper, we present an efficient failure recovery scheme for mobile applications based on movement-based checkpointing and logging.  ...  We identify the optimal movement threshold which will minimize the recovery cost per failure as a function of the mobile node's mobility rate, failure rate and log arrival rate.  ...  Thus, there exists a tradeoff between recovery time and the total time spent on the checkpoints and logging for a fixed cost.  ... 
doi:10.1145/1140104.1140115 dblp:conf/mobide/GeorgeCJ06 fatcat:qaq7hoxbzvbsxjln7rq3yaqguy

Movement-based checkpointing and logging for failure recovery of database applications in mobile environments

Sapna E. George, Ing-Ray Chen
2008 Distributed and parallel databases  
In this paper, we present an efficient failure recovery scheme for mobile database applications based on movement-based checkpointing and logging.  ...  We identify the optimal movement threshold which will minimize the recovery cost per failure as a function of the mobile node's mobility rate, failure rate and log arrival rate.  ...  over the checkpoint interval and causing the system to take more time to load and execute log entries for failure recovery.  ... 
doi:10.1007/s10619-008-7026-3 fatcat:i3vhst454fhvvhh5wc4ye63ajq

An Approach to Rollback Recovery of Collaborating Mobile Agents

T. Osman, W. Wagealla, A. Bargiela
2004 IEEE Transactions on Systems Man and Cybernetics Part C (Applications and Reviews)  
to develop a pragmatic framework for agent systems fault-tolerance.  ...  The developed framework deploys a communication-pairs independent checkpointing strategy to offer a low-cost, application-transparent model for reliable agent-based computing that covers all possible faults  ...  Sections 4 and 5 discuss the fault-tolerance framework for mobile agents.  ... 
doi:10.1109/tsmcc.2003.818496 fatcat:ij2pswsd75gjhozv3dofadqq2e

Adaptive recovery for mobile environments

Nuno Neves, W. Kent Fuchs
1997 Communications of the ACM  
ACKNOWLEDGMENTS We would like to thank the anonymous referees for their comments, and Jenny Applequist for her suggestions that helped to improve the readability of the article.  ...  In this article, we focus on checkpoint-based recovery techniques for distributed systems.  ...  The second approach creates checkpoints periodically, and logs all messages received. Checkpoints and message logs are stored in the foreign agents as in [1] .  ... 
doi:10.1145/242857.242878 fatcat:wsmvrx654zbvpoqleqr4t47e4y

Quantum Game Application to Recovery Problem in Mobile Database

Magda M. Madbouly, Yasser F. Mokhtar, Saad M. Darwish
2021 Symmetry  
needed to send messages, and the number of messages logged-in time.  ...  Due to the dynamic nature of mobility and the limited bandwidth available on wireless networks, this new computing environment for mobile devices presents significant challenges in terms of fault-tolerant  ...  Data Availability Statement: The study did not report any data. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/sym13111984 doaj:74c26df61db941a0bfcebbf269a5c8f3 fatcat:qjpdpgwmo5g2pnuybaisjzx5nq

Dynamic Fault Tolerance in Distributed Simulation System [chapter]

Min Ma, Shiyao Jin, Chaoqun Ye, Xiaojian Liu
2006 Lecture Notes in Computer Science  
The proposed protocol uses iterative backup location scheme and adaptive update interval to reduce overhead and balance the cost of fault tolerance and recovery time.  ...  Distributed simulation system is widely used for forecasting, decision-making and scientific computing. Multi-agent and Grid have been used as platform for simulation.  ...  The scale of simulation system develops from small to large rapidly, the platform of simulation system combines the technology of Grid and mobile agent, and furthermore, system executive time extends from  ... 
doi:10.1007/11758501_102 fatcat:h3vaywdcb5dk5f7mlr5vyjsa4m

Analysis of Recent Checkpointing Techniques for Mobile Computing Systems [article]

Ruchi Tuli, Parveen Kumar
2011 arXiv   pre-print
This paper surveys the algorithms which have been reported in the literature for checkpointing in Mobile Computing Systems.  ...  To add reliability and high availability to such distributed systems, checkpoint based rollback recovery is one of the widely used techniques for applications such as scientific computing, database, telecommunication  ...  These schemes keep the recovery information of MH in certain range. The movement-based scheme considers both of the failure-free execution cost and the failure-recovery cost.  ... 
arXiv:1108.6195v1 fatcat:y7gc76fjnrclhmz5thdrmabbv4

Design and Evaluation of a Fault-Tolerant Mobile-Agent System

M.R. Lyu, Xinyu Chen, Tsz Yeung Wong
2004 IEEE Intelligent Systems  
In this paper, we address a fault tolerance approach of deploying cooperating agents to detect server and agent failures as well as to recover services in mobile agent systems.  ...  Improving the survivability of mobile agents in the presence of agent server failures with unreliable underlying networks is a challenging issue.  ...  We denote a mobile agent system without any fault tolerance as Level 0. For comparison, we introduce a server failure detection and recovery mechanism.  ... 
doi:10.1109/mis.2004.40 fatcat:si5myzmhnngg5olk3ibv2ikw4q

A Survey on Data and Transaction Management in Mobile Databases

D Roselin Selvarani
2012 International Journal of Database Management Systems  
The survey focuses on the complete study on the various types of Architectures used in Mobile databases and Mobile Transaction Models.  ...  Query Processing, Recovery and Security.  ...  The authors identify the optimal movement threshold which will minimize the recovery cost per failure as a function of the mobile node's mobility rate, failure rate and log arrival rate.  ... 
doi:10.5121/ijdms.2012.4501 fatcat:hz6dj72yrzev3cvfdqkphlmmci

The role of mobile agents in increasing speed up repair failure in the mobile database systems

Maryam Mahmoodi, Neda Ashrafi, Shabnam Nasr Esfahani
2010 2010 3rd International Conference on Computer Science and Information Technology  
The mobility of the hosts in mobile database system makes it difficult to access the log and take checkpoint, while it is being repair failured.  ...  In this article, we used the mobile agents in order to improve the time of checkpoint and as a result, the total time of repair failure will be decreased.  ...  It is responsible for maintaining log and recovery information on behalf of MH. MH sends log events to this agent, which is responsible for storing them on the fixed storage of the BS.  ... 
doi:10.1109/iccsit.2010.5564773 fatcat:6pqzxwtvvnft5p2yxom3onefdy

Log Based Recovery with Low Overhead for Mobile Computing Systems [chapter]

Awadhesh Kumar Singh, Parmeet Kaur
2011 Communications in Computer and Information Science  
The article proposes a recovery protocol for applications in large mobile computing environment by combining movement based checkpointing with message logging.  ...  For accomplishing this, the mobile system is divided into regions and a checkpoint is taken once when a mobile node enters a region and at most once while it moves within that region.  ...  It deals with the constraints of the mobile nodes and describes a low-cost failure-free mechanism for checkpointing.  ... 
doi:10.1007/978-3-642-19542-6_125 fatcat:wv7eelrmdzeo7buu6pcyp3w4d4

Analysis of Fault Tolerant Techniques in Secure Mobile Agent Paradigm

Parul Arora, Sahil Vashist, Rajwinder Singh, Rahul Hans
2014 Journal of Emerging Technologies in Web Intelligence  
The parameters used for the evaluation of various techniques are agent centric, system centric, fault type, coordination performance analysis, central management and adaptive.  ...  Since the past few years, the network domains and mobile agent technology has been the fastest growing and emerging trend as well.  ...  By using this technique Checkpoint Transfer Time (CTT) and total cost of recovery can be calculated and compared to already existing checkpointing techniques.  ... 
doi:10.4304/jetwi.6.2.231-236 fatcat:dr2imdcftnfjtholtx6ni2eipe
« Previous Showing results 1 — 15 out of 1,320 results