1972
DOI: 10.1109/tc.1972.5009007
|View full text |Cite
|
Sign up to set email alerts
|

Rollback and Recovery Strategies for Computer Programs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
51
0
1

Year Published

1981
1981
2010
2010

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 131 publications
(52 citation statements)
references
References 7 publications
0
51
0
1
Order By: Relevance
“…Figure 2 presents task definitions from the web browser example. A task definition consists of the task keyword, the task's name, the task's parameter declarations, and t a g p t =new t a g ( p a g e t a g ) ; 4 Page p=new Page ( ) ( add p t ) ; 5 . .…”
Section: Classesmentioning
confidence: 99%
See 1 more Smart Citation
“…Figure 2 presents task definitions from the web browser example. A task definition consists of the task keyword, the task's name, the task's parameter declarations, and t a g p t =new t a g ( p a g e t a g ) ; 4 Page p=new Page ( ) ( add p t ) ; 5 . .…”
Section: Classesmentioning
confidence: 99%
“…Backward recovery uses a combination of checkpointing and acceptance tests to prevent a software system from entering an incorrect state [5]. Forward recovery uses multiple copies of a computation to recover from transient errors [11].…”
Section: Related Workmentioning
confidence: 99%
“…The comparison of the new on-line algorithm with the fixed intervals placement strategy is done by comparing the overhead ratio of the on-line algorithm, given in Lemma 2, with the overhead ratio of the fixed intervals placement strategy, given in (2). The values of t 1 and t 2 for the on-line algorithm and the interval length t for the fixed intervals placement strategy are those that minimize the overhead ratio.…”
Section: Comparison With Existing Algorithmsmentioning
confidence: 99%
“…Another approach for placing checkpoints, that takes into account the change of checkpointing overhead over time, can be found in [2]. In that paper, Chandy and Ramamoorthy proposed an algorithm, based on a graph theoretic method, for a placement of checkpoints that allows the programmer to decide where to place checkpoints according to an a priori knowledge about the cost of checkpointing.…”
Section: Introductionmentioning
confidence: 99%
“…Chandy [3] discusses costs of rollback and recovery with several assumptions: the checkpointing time is fixed, the time required to reprocess the logged transactions is proportional to the number of transactions recorded since the last checkpoint, and the checkpoint itself is always correct. In [4], Chandy et al propose algorithms which make use of estimates made by the programmers on the maximum amount of processing time to minimize the maximum or expected time spent in checkpointing. These algorithms need some a priori knowledge about the processing time.…”
Section: Related Workmentioning
confidence: 99%