2014 International Conference on Computing, Networking and Communications (ICNC) 2014
DOI: 10.1109/iccnc.2014.6785308
|View full text |Cite
|
Sign up to set email alerts
|

Shadow Computing: An energy-aware fault tolerant computing model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(11 citation statements)
references
References 6 publications
0
11
0
Order By: Relevance
“…To address outsourcing security issues, initially, the cloud supplier should be reliable by giving trust and secure computing and data stockpiling; second, outsourced data and computation might be evident to clients as far as classification, honesty, and other security administrations. Likewise, outsourcing will possibly bring about security violation, because of the way that delicate data is out of the proprietor's control [2]. 2.…”
Section: Security Feature In Cloud Computingmentioning
confidence: 99%
See 1 more Smart Citation
“…To address outsourcing security issues, initially, the cloud supplier should be reliable by giving trust and secure computing and data stockpiling; second, outsourced data and computation might be evident to clients as far as classification, honesty, and other security administrations. Likewise, outsourcing will possibly bring about security violation, because of the way that delicate data is out of the proprietor's control [2]. 2.…”
Section: Security Feature In Cloud Computingmentioning
confidence: 99%
“…Even though, there is no requirement of knowledge or expertise to control the infrastructure of clouds; it is abstract to the user. It is a service of an Internet with high scalability, quality of service, higher throughput and high computing power [2]. Cloud computing providers deploy common online business applications which are accessed from servers through web browser.…”
Section: Introductionmentioning
confidence: 99%
“…Once an instance saves a checkpoint, the other instance can use this checkpoint immediately to "jump ahead" in its execution. A similar technique named shadow replication has been introduced in [12]. In this work, the authors consider a slow and a fast replica in order to both increase the reliability of the execution and reduce the associated energy consumption.…”
Section: Introductionmentioning
confidence: 99%
“…This model allows for combining SDC detection with shadow computing [36], where only the primary replica processes proceed at full speed and others can be operated at lower power. Slower replicas would provide eventual confirmation of results;…”
Section: Chapter 3 Designmentioning
confidence: 99%
“…Another body of work within resilience concentrates on management of the replica processes themselves. Shadow computing executes non-primary replica processes at slower speeds [36,12,13]. When the primary processes are successful, the replicas can be terminated early, saving power.…”
Section: Process Managementmentioning
confidence: 99%