25th IEEE International Conference on Distributed Computing Systems (ICDCS'05)
DOI: 10.1109/icdcs.2005.58
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Asynchronous Garbage Collection for RDT Checkpointing Protocols

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
3
0
1

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 23 publications
0
3
0
1
Order By: Relevance
“…This is particularly important since it has been shown that n is also the upper bound on the number of nonobsolete checkpoints per process [1]. In [2] we present an algorithm based on this condition that eliminates checkpoints on-the-fly during execution. It runs locally to each process and is based only on the timestamps already propagated by the checkpointing protocol, increasing neither the amount of control information piggybacked nor the execution complexity of the checkpointing middleware.…”
mentioning
confidence: 99%
See 2 more Smart Citations
“…This is particularly important since it has been shown that n is also the upper bound on the number of nonobsolete checkpoints per process [1]. In [2] we present an algorithm based on this condition that eliminates checkpoints on-the-fly during execution. It runs locally to each process and is based only on the timestamps already propagated by the checkpointing protocol, increasing neither the amount of control information piggybacked nor the execution complexity of the checkpointing middleware.…”
mentioning
confidence: 99%
“…The paper shows that it is possible to do asynchronous garbage collection when RDT holds [2]. We introduce a necessary and sufficient condition to make a checkpoint obsolete in RDT scenarios and derive from that a sufficient condition to identify obsolete checkpoints based only on causal knowledge.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Em particular, a coleta de lixo ingênua ou a ótima em padrões de checkpoints e mensagens que satisfazem a propriedade RDT podem ser simplificadas. Neste caso, os processos devem manter, no máximo, n checkpoints e a linha de recuperação pode ser calculada apenas com informações locais sem a necessidade de troca de mensagens ou bloqueio dos processos durante sua execução [37].…”
Section: Coleta De Lixounclassified