2017
DOI: 10.1002/cpe.4271
|View full text |Cite
|
Sign up to set email alerts
|

Low overhead communication‐induced checkpointing protocols ensuring rollback‐dependency trackability property

Abstract: SummaryCommunication‐induced checkpointing (CIC) protocols aim at finding consistent global checkpoint from which a system can safely restart without the risk of domino effect. CIC class gives processes the maximum autonomy for taking their local checkpoints while directs them to take forced checkpoints when harm patterns are detected. Such patterns can constitute of non‐causally doubled Z‐paths that violate the causal relation and can cause checkpoints uselessness, which results in hidden dependencies between… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…Most existing CIC protocols [3][4][5][6][7][8][9][10]14,15] have been designed to ensure that no basic checkpoint becomes useless by satisfying Theorem 2 at all times.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Most existing CIC protocols [3][4][5][6][7][8][9][10]14,15] have been designed to ensure that no basic checkpoint becomes useless by satisfying Theorem 2 at all times.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, if needed before message delivery, additional checkpoints, called forced checkpoints, can be taken based on the local variables of the process and the information piggybacked on the messages [2]. Most CIC protocols [3][4][5][6][7][8][9][10][11][12][13][14][15] with these advantages have the following common behavioral features. If each process recognizes the delivery of a message may make any other local checkpoint of another process, called a basic checkpoint, become useless, the protocols make the process take a forced checkpoint.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations