A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Using Adaptive Agents for the Fault-Tolerant Mobile Computing System
[chapter]
2006
Lecture Notes in Computer Science
The agents try to keep the failure-recovery cost and the failure-free operation cost within a certain level, regardless of the handoff frequency of the mobile hosts. ...
The mobility of the agent is suitable to trace the mobile hosts in the system and the intelligence of the agent makes it efficient to support the fault-tolerance services. ...
The others are mobile agents, called the checkpointing agent (CPA) and the log agent (LGA), each of which manages and makes the migration decision of the latest checkpoint and the message logs, respectively ...
doi:10.1007/11758532_105
fatcat:qjrnhcl36zfkjpiu7vqdklaoh4
Log Management support for recovery in mobile computing Environment
[article]
2009
arXiv
pre-print
Thus considering challenges in wireless mobile networks, a new log management scheme is proposed for recovery of mobile transactions. ...
The proposed scheme is compared with the existing Lazy and Pessimistic scheme and a trade off analysis between the cost invested to manage log and the return of investment in terms of improved failure ...
CONCLUSION The proposed log management scheme for mobile computing system reduces total cost for recovery from the failure when compared with the existing Lazy and pessimistic schemes. ...
arXiv:0908.0076v1
fatcat:rch3kblphfaxhb4lhzmfgl7xcy
Database Recovery Technique for Mobile Computing: A Game Theory Approach
2022
Computers Materials & Continua
Contact between mobile hosts and database servers presents many problems in the Mobile Database System (MDS). ...
to deliver messages, and the number of messages logged-in time. ...
Funding Statement: The authors received no specific funding for this study.
Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study. ...
doi:10.32604/cmc.2022.019440
fatcat:57sxl6hlmjc5hal4kfbvcbo4ky
Movement-based checkpointing and logging for recovery in mobile computing systems
2006
Proceedings of the 5th ACM international workshop on Data engineering for wireless and mobile access - MobiDE '06
In this paper, we present an efficient failure recovery scheme for mobile applications based on movement-based checkpointing and logging. ...
We identify the optimal movement threshold which will minimize the recovery cost per failure as a function of the mobile node's mobility rate, failure rate and log arrival rate. ...
Thus, there exists a tradeoff between recovery time and the total time spent on the checkpoints and logging for a fixed cost. ...
doi:10.1145/1140104.1140115
dblp:conf/mobide/GeorgeCJ06
fatcat:qaq7hoxbzvbsxjln7rq3yaqguy
Movement-based checkpointing and logging for failure recovery of database applications in mobile environments
2008
Distributed and parallel databases
In this paper, we present an efficient failure recovery scheme for mobile database applications based on movement-based checkpointing and logging. ...
We identify the optimal movement threshold which will minimize the recovery cost per failure as a function of the mobile node's mobility rate, failure rate and log arrival rate. ...
over the checkpoint interval and causing the system to take more time to load and execute log entries for failure recovery. ...
doi:10.1007/s10619-008-7026-3
fatcat:i3vhst454fhvvhh5wc4ye63ajq
An Approach to Rollback Recovery of Collaborating Mobile Agents
2004
IEEE Transactions on Systems Man and Cybernetics Part C (Applications and Reviews)
to develop a pragmatic framework for agent systems fault-tolerance. ...
The developed framework deploys a communication-pairs independent checkpointing strategy to offer a low-cost, application-transparent model for reliable agent-based computing that covers all possible faults ...
Sections 4 and 5 discuss the fault-tolerance framework for mobile agents. ...
doi:10.1109/tsmcc.2003.818496
fatcat:ij2pswsd75gjhozv3dofadqq2e
Adaptive recovery for mobile environments
1997
Communications of the ACM
ACKNOWLEDGMENTS We would like to thank the anonymous referees for their comments, and Jenny Applequist for her suggestions that helped to improve the readability of the article. ...
In this article, we focus on checkpoint-based recovery techniques for distributed systems. ...
The second approach creates checkpoints periodically, and logs all messages received. Checkpoints and message logs are stored in the foreign agents as in [1] . ...
doi:10.1145/242857.242878
fatcat:wsmvrx654zbvpoqleqr4t47e4y
Quantum Game Application to Recovery Problem in Mobile Database
2021
Symmetry
needed to send messages, and the number of messages logged-in time. ...
Due to the dynamic nature of mobility and the limited bandwidth available on wireless networks, this new computing environment for mobile devices presents significant challenges in terms of fault-tolerant ...
Data Availability Statement: The study did not report any data.
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/sym13111984
doaj:74c26df61db941a0bfcebbf269a5c8f3
fatcat:qjpdpgwmo5g2pnuybaisjzx5nq
Dynamic Fault Tolerance in Distributed Simulation System
[chapter]
2006
Lecture Notes in Computer Science
The proposed protocol uses iterative backup location scheme and adaptive update interval to reduce overhead and balance the cost of fault tolerance and recovery time. ...
Distributed simulation system is widely used for forecasting, decision-making and scientific computing. Multi-agent and Grid have been used as platform for simulation. ...
The scale of simulation system develops from small to large rapidly, the platform of simulation system combines the technology of Grid and mobile agent, and furthermore, system executive time extends from ...
doi:10.1007/11758501_102
fatcat:h3vaywdcb5dk5f7mlr5vyjsa4m
Analysis of Recent Checkpointing Techniques for Mobile Computing Systems
[article]
2011
arXiv
pre-print
This paper surveys the algorithms which have been reported in the literature for checkpointing in Mobile Computing Systems. ...
To add reliability and high availability to such distributed systems, checkpoint based rollback recovery is one of the widely used techniques for applications such as scientific computing, database, telecommunication ...
These schemes keep the recovery information of MH in certain range. The movement-based scheme considers both of the failure-free execution cost and the failure-recovery cost. ...
arXiv:1108.6195v1
fatcat:y7gc76fjnrclhmz5thdrmabbv4
Design and Evaluation of a Fault-Tolerant Mobile-Agent System
2004
IEEE Intelligent Systems
In this paper, we address a fault tolerance approach of deploying cooperating agents to detect server and agent failures as well as to recover services in mobile agent systems. ...
Improving the survivability of mobile agents in the presence of agent server failures with unreliable underlying networks is a challenging issue. ...
We denote a mobile agent system without any fault tolerance as Level 0. For comparison, we introduce a server failure detection and recovery mechanism. ...
doi:10.1109/mis.2004.40
fatcat:si5myzmhnngg5olk3ibv2ikw4q
A Survey on Data and Transaction Management in Mobile Databases
2012
International Journal of Database Management Systems
The survey focuses on the complete study on the various types of Architectures used in Mobile databases and Mobile Transaction Models. ...
Query Processing, Recovery and Security. ...
The authors identify the optimal movement threshold which will minimize the recovery cost per failure as a function of the mobile node's mobility rate, failure rate and log arrival rate. ...
doi:10.5121/ijdms.2012.4501
fatcat:hz6dj72yrzev3cvfdqkphlmmci
The role of mobile agents in increasing speed up repair failure in the mobile database systems
2010
2010 3rd International Conference on Computer Science and Information Technology
The mobility of the hosts in mobile database system makes it difficult to access the log and take checkpoint, while it is being repair failured. ...
In this article, we used the mobile agents in order to improve the time of checkpoint and as a result, the total time of repair failure will be decreased. ...
It is responsible for maintaining log
and recovery information on behalf of MH. MH
sends log events to this agent, which is responsible
for storing them on the fixed storage of the BS. ...
doi:10.1109/iccsit.2010.5564773
fatcat:6pqzxwtvvnft5p2yxom3onefdy
Log Based Recovery with Low Overhead for Mobile Computing Systems
[chapter]
2011
Communications in Computer and Information Science
The article proposes a recovery protocol for applications in large mobile computing environment by combining movement based checkpointing with message logging. ...
For accomplishing this, the mobile system is divided into regions and a checkpoint is taken once when a mobile node enters a region and at most once while it moves within that region. ...
It deals with the constraints of the mobile nodes and describes a low-cost failure-free mechanism for checkpointing. ...
doi:10.1007/978-3-642-19542-6_125
fatcat:wv7eelrmdzeo7buu6pcyp3w4d4
Analysis of Fault Tolerant Techniques in Secure Mobile Agent Paradigm
2014
Journal of Emerging Technologies in Web Intelligence
The parameters used for the evaluation of various techniques are agent centric, system centric, fault type, coordination performance analysis, central management and adaptive. ...
Since the past few years, the network domains and mobile agent technology has been the fastest growing and emerging trend as well. ...
By using this technique Checkpoint Transfer Time (CTT) and total cost of recovery can be calculated and compared to already existing checkpointing techniques. ...
doi:10.4304/jetwi.6.2.231-236
fatcat:dr2imdcftnfjtholtx6ni2eipe
« Previous
Showing results 1 — 15 out of 1,320 results