2003
DOI: 10.1007/978-3-540-39867-7_6
|View full text |Cite
|
Sign up to set email alerts
|

A Checkpointing Algorithm for Mobile Computing Environment

Abstract: Abstract. Mobile computing is going to change the way, computers are used today. However mobile computing environment has features like high mobility, frequent disconnections, and lack of resources, such as memory and battery power. Such features make applications, running on mobile devices, more susceptible to faults. Checkpointing is a major technique to confine faults and restart applications faster. In this paper, we present a coordinated checkpointing algorithm for deterministic applications. We are using… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2003
2003
2021
2021

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 9 publications
0
8
0
Order By: Relevance
“…Singh and Cabillic [13] proposed a checkpointing algorithm for mobile computing environments on the basis of anti-message logging. This algorithm may lead to inconsistencies as follows.…”
Section: Problems In the Existing Algorithmsmentioning
confidence: 99%
See 3 more Smart Citations
“…Singh and Cabillic [13] proposed a checkpointing algorithm for mobile computing environments on the basis of anti-message logging. This algorithm may lead to inconsistencies as follows.…”
Section: Problems In the Existing Algorithmsmentioning
confidence: 99%
“…Each process progresses at its own speed and messages are exchanged through reliable channels, whose transmission delays are finite but arbitrary. We also assume that the processes are deterministic as in [11], [12], [13].…”
Section: The Proposed Checkpointing Algorithm 21 System Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…Singh and Cabillic [71] proposed a minimum-process nonintrusive coordinated checkpointing protocol for deterministic mobile systems. In the first phase, a process starts checkpointing as checkpoint initiator by sending requests to processes over which it directly depends.…”
Section: Related Workmentioning
confidence: 99%