2020
DOI: 10.3390/app10072495
|View full text |Cite
|
Sign up to set email alerts
|

Autonomic Web Services Based on Different Adaptive Quasi-Asynchronous Checkpointing Techniques

Abstract: Companies, organizations and individuals use Web services to build complex business functionalities. Web services must operate properly in the unreliable Internet infrastructure even in the presence of failures. To increase system dependability, organizations, including service providers, adapt their systems to the autonomic computing paradigm. Strategies can vary from having one to all (S-CHOP, self-configuration, self-healing, self-optimization and self-protection) features. Regarding self-healing, an almost… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(14 citation statements)
references
References 27 publications
0
14
0
Order By: Relevance
“…The authors of [6] proposed an adaptive checkpoint generation algorithm in order to decrease the frequency of forced checkpointing actions by considering the system's behavior in comparison with the static algorithm, which did not reflect the environmental changes onto web services being operated. The algorithm made decisions on whether forced checkpoints should be taken based on the quality of the service parameters and the policies currently applied to their corresponding web services.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…The authors of [6] proposed an adaptive checkpoint generation algorithm in order to decrease the frequency of forced checkpointing actions by considering the system's behavior in comparison with the static algorithm, which did not reflect the environmental changes onto web services being operated. The algorithm made decisions on whether forced checkpoints should be taken based on the quality of the service parameters and the policies currently applied to their corresponding web services.…”
Section: Related Workmentioning
confidence: 99%
“…According to when and how consistent sets of checkpoints are formed, checkpoint-based recovery protocols are categorized into coordinated, independent, and communication-induced checkpointing [5]. In order to balance trade-offs between independent and coordinated checkpointing in an effective manner, communication-induced checkpointing (CIC) is used to preclude any local checkpoint that have already been taken from becoming useless by performing forced checkpointing while attempting to increase the degree of checkpointing independence as much as possible [6][7][8][9][10][11][12][13][14][15]. The CIC protocols include HMNR [8], which uses this feature to enable the number of extra checkpoints to be much lower by effectively using the control information contained in each sent message.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…To harmonize the pros and cons of uncoordinated and coordinated checkpointing, communication-induced checkpointing (CIC) was developed to provide best-effort autonomy with respect to taking local checkpoints while preventing them from being useless for recovery with forced checkpoints [8], [9]. The prior research works on CIC with this feature have pursued a ultimate goal to minimize the number of forced checkpoints [8], [9], [15]. HMNR protocol [9] effectively utilizes some control information vectors contained in each sent message to attempt to decrease the number of worthless forced checkpoints to a maximum.…”
Section: Introductionmentioning
confidence: 99%