Lalit K. Awasthi, Manoj Misra, and Ramesh C. Joshi
[1] J. Tsai, S.Y. Kuo, and Y.M. Wang, Theoretical analysis forcommunication-induced checkpointing protocols with rollback-dependency trackability, IEEE Transactions on Parallel andDistributed Systems, 9(10), 1998, 963–971. [2] Y.M. Wang, Consistent global checkpoints that contain a givenset of local checkpoints, IEEE Transactions on Computers,46(4), 1997, 456–458. [3] D.R. Russel, State restoration in systems of communicatingprocesses, IEEE Transactions on Software Engineering, 6(2),1980, 183–194. [4] E.N. Elnozahy, L. Alvisi, Y.M. Wang, and D.B. Johnson,A survey of rollback-recovery protocols in message-passingsystems, ACM Computing Surveys, 34(3), 2002, 375–408. [5] E.N. Elnozahy, D.B. Johnson, and W. Zwaenepoel, The perfor-mance of consistent checkpointing, Proc. 1992 Symposium onReliable Distributed Systems, IEEE Computer Society, 1992,39–47. [6] R. Koo and S. Toueg, Checkpointing and rollback recovery fordistributed systems, IEEE Transaction on Software Engineer-ing, 13(1), 1987, 23–31. [7] G. Cao and M. Singhal, On the impossibility of min-process non-blocking checkpointing and an efficient checkpointing algorithmfor mobile computing systems, Proc. 1988 Int. Conf. on ParallelProcessing, IEEE Computer Society, 1998, 37–44. [8] G. Cao and M. Singhal, Mutable checkpoints: A new check-pointing approach for mobile computing systems, IEEE Trans-action on Parallel and Distributed Systems, 12(2), 2001, 157–172. [9] E. Gendelman, L.F. Bic, and M.B. Dillencourt, Efficient check-pointing algorithm for distributed systems implementing re-liable communication channels, Proc. Symposium on ReliableDistributed Systems, IEEE Computer Society, 1999, 290–291. [10] K.M. Chandy and L. Lamport, Distributed snapshots: Deter-mining global state of distributed systems, ACM Transactionon Computing Systems, 3(1), 1985, 63–75. [11] T.H. Lai and T.H. Yang, On distributed snapshots, InformationProcessing Letters 25(3), 1987, 53–158. [12] K. Li, J.F. Naughton, and J.S. Plank, Checkpointing multicom-puter applications, Proc. Symposium on Reliable DistributedSystems, IEEE Computer Society, 1991, 2–11. [13] L.M. Silva and J.G. Silva, Global checkpointing for distributedprograms, Proc. Symposium on Reliable Distributed Systems,IEEE Computer Society, 1992, 155–162. [14] A. Acharya and B.R. Badrinath, Checkpointing distributedapplications on mobile computers, Proc. 1994 Int. Conf. onParallel and Distributed Information Systems, IEEE ComputerSociety, 1994, 73–80. [15] R. Baldoni, J.M. H´elary, A. Mostefaoui, and M. Raynal, Acommunication-induced checkpointing protocol that ensuresrollback-dependency trackability, in Proc. 1997 Int. Sympo-sium on Fault-Tolerant-Computing Systems, IEEE ComputerSociety, 1997, 68–77. [16] D. Briatico, A. Ciuffoletti, and L. Simoncini, A distributeddomino-effect free recovery algorithm, Proc. 1984 Int. Sym-posium on Reliable Distributed Software and Database, IEEEComputer Society, 1984, 207–215. [17] J.M. H´elary, A. Mostefaoui, and M. Raynal, Communication-induced determination of consistent snapshots, Proc. Int. Sym-posium on Fault-Tolerant Computing, IEEE Computer Society,1998, 208–217. [18] L.K. Awasthi and P. Kumar, A synchronous checkpointingprotocol for mobile distributed systems: Probabilistic approachInternational Journal of Information and Computer Security,1(3), 2007, 298–314. [19] L.K. Awasthi, M. Misra, and R.C. Joshi, A weighted check-pointing protocol for mobile distributed system, InternationalJournal of ad hoc and ubiquitous Computing, 5(3), 2010,137–149. [20] L. Kumar, M. Misra, and R.C. Joshi, Low overhead optimalcheckpointing for mobile distributed systems, Proc. IEEE Int.Conf. on Data Engineering (ICDE 03), March 2003, 686–688. [21] R. Baldoni, F. Quaglia, and P. Fornara, An index-basedcheckpointing algorithm for autonomous distributed systems,9IEEE Transactions Parallel Distributed Systems, 10(2), 1999,181–192. [22] J. Tsai, An efficient index-based checkpointing protocol withconstant-size control information on messages, IEEE Transac-tion on Dependable and Secure Computing, 2(4), 2005, 287–96. [23] E.N. Elnozahy and J.S. Plank, Checkpointing for peta-scalesystems: A look into the future of practical rollback-recovery,IEEE Transaction on Dependable and Secure Computing, 1(2),2004, 97–108.
Important Links:
Go Back