Checkpointing and Rollback-Recovery for Distributed Systems
IEEE Transactions on Software Engineering - Special issue on distributed systems
Availability of a distributed computer system with failures
Acta Informatica
Load sharing in distributed systems with failures
Acta Informatica
Logical Time in Distributed Computing Systems
Computer - Distributed computing systems: separate resources acting as one
Necessary and Sufficient Conditions for Consistent Global Snapshots
IEEE Transactions on Parallel and Distributed Systems
Consistent Global Checkpoints that Contain a Given Set of Local Checkpoints
IEEE Transactions on Computers
An Index-Based Checkpointing Algorithm for Autonomous Distributed Systems
IEEE Transactions on Parallel and Distributed Systems
Evaluations of domino-free communication-induced checkpointing protocols
Information Processing Letters
Quasi-Synchronous Checkpointing: Models, Characterization, and Classification
IEEE Transactions on Parallel and Distributed Systems
Communication-Induced Determination of Consistent Snapshots
IEEE Transactions on Parallel and Distributed Systems
On the Optimum Checkpoint Interval
Journal of the ACM (JACM)
Fail-stop processors: an approach to designing fault-tolerant computing systems
ACM Transactions on Computer Systems (TOCS)
Performance of rollback recovery systems under intermittent failures
Communications of the ACM
Time, clocks, and the ordering of events in a distributed system
Communications of the ACM
On the no-z-cycle property in distributed executions
Journal of Computer and System Sciences
A survey of rollback-recovery protocols in message-passing systems
ACM Computing Surveys (CSUR)
Virtual Precedence in Asynchronous Systems: Cencept and Applications
WDAG '97 Proceedings of the 11th International Workshop on Distributed Algorithms
A Communication-Induced Checkpointing Protocol that Ensures Rollback-Dependency Trackability
FTCS '97 Proceedings of the 27th International Symposium on Fault-Tolerant Computing (FTCS '97)
A model of roll-back recovery with multiple checkpoints
ICSE '76 Proceedings of the 2nd international conference on Software engineering
On Characteristics of DEF Communication-Induced Checkpointing Protocols
PRDC '02 Proceedings of the 2002 Pacific Rim International Symposium on Dependable Computing
A VP-Accordant Checkpointing Protocol Preventing Useless Checkpoints
SRDS '98 Proceedings of the The 17th IEEE Symposium on Reliable Distributed Systems
A low-overhead recovery technique using quasi-synchronous checkpointing
ICDCS '96 Proceedings of the 16th International Conference on Distributed Computing Systems (ICDCS '96)
On the Minimal Characterization of the Rollback-Dependency Trackability Property
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
SRDS '04 Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems
SRDS '04 Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems
Communication-based prevention of useless checkpoints in distributed computations
Distributed Computing
On the Fully-Informed Communication-Induced Checkpointing Protocol
PRDC '05 Proceedings of the 11th Pacific Rim International Symposium on Dependable Computing
An enhanced model-based checkpointing protocol
PDCN'07 Proceedings of the 25th conference on Proceedings of the 25th IASTED International Multi-Conference: parallel and distributed computing and networks
Analysis of Update Synchronization for Multiple Copy Data Bases
IEEE Transactions on Computers
Optimization of the Number of Copies in a Distributed Data Base
IEEE Transactions on Software Engineering
Model-based performance evaluation of distributed checkpointing protocols
Performance Evaluation
FINE: A Fully Informed aNd Efficient Communication-Induced Checkpointing Protocol
ICONS '08 Proceedings of the Third International Conference on Systems
Future Generation Computer Systems
International Journal of Security and Networks
The Journal of Supercomputing
Hi-index | 0.00 |
Communication-induced checkpointing (CIC) protocols help in bounding rollback propagation by ensuring that each checkpoint taken is useful, while at the same time allowing each process to take checkpoints independently. In this paper, we focus on the evaluation of CIC protocols belonging to two families, namely, the F"E family and F"L"a"z"y"-"E family. We present both theoretical and experimental evaluation of the protocols belonging to these two families. The results of our experimental evaluation not only confirm the theoretical comparison but also reveals the fine differences between these protocols.