A non-blocking coordinated checkpointing algorithm for message-passing systems
This paper proposes an efficient non-blocking coordinated checkpointing algorithm for distributed message passing system which uses transitive dependency information. The processes synchronize their checkpointing activities so that a globally consistent set of checkpoints is always maintained in the...
| Main Authors: | Mansouri, Houssem, Aliouat, Makhlouf, Badache, Nadjib, Khan, Al Sakib Pathan |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English |
| Published: |
Association for Computing Machinery (ACM)
2015
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/50744/ http://irep.iium.edu.my/50744/1/50744-new.pdf http://irep.iium.edu.my/50744/4/50744_A%20non-blocking%20coordinated%20checkpointing%20algorithm%20for%20message-passing%20systems_Scopus.pdf |
Similar Items
A new efficient checkpointing algorithm for distributed mobile computing
by: Mansouri, Houssem, et al.
Published: (2015)
by: Mansouri, Houssem, et al.
Published: (2015)
Adaptive fault tolerant checkpointing algorithm for cluster based mobile Ad Hoc networks
by: Mansour, Houssem, et al.
Published: (2015)
by: Mansour, Houssem, et al.
Published: (2015)
Strengths and weaknesses of prominent data dissemination techniques in wireless sensor networks
by: Guerroumi, Mohamed, et al.
Published: (2013)
by: Guerroumi, Mohamed, et al.
Published: (2013)
On the medium access control protocols suitable for wireless sensor networks – a survey
by: Guerroumi, Mohamed, et al.
Published: (2014)
by: Guerroumi, Mohamed, et al.
Published: (2014)
Parallelization of prime number generation using message passing interface
by: I.A., Aziz, et al.
Published: (2008)
by: I.A., Aziz, et al.
Published: (2008)
Corona: a stabilizing deterministic message-passing skip list
by: Mohd. Nor, Rizal, et al.
Published: (2013)
by: Mohd. Nor, Rizal, et al.
Published: (2013)
Iterative frequency domain equalization with generalized approximate message passing
by: Guo, Q., et al.
Published: (2013)
by: Guo, Q., et al.
Published: (2013)
MEMPHA: Model of Exascale message-passing programs on heterogeneous architectures
by: Koohi, Sina Zangbari, et al.
Published: (2020)
by: Koohi, Sina Zangbari, et al.
Published: (2020)
Perbandingan Prestasi Antara Message Passing Interface Java (Mpijava) Dan Java Object Passing Interface (Jopi)
by: M.Azmi, Zafril Rizal, et al.
Published: (2006)
by: M.Azmi, Zafril Rizal, et al.
Published: (2006)
Exploiting cyclic prefix for joint detection, decoding and channel estimation in OFDM via EM algorithm and message passing
by: Yang, J., et al.
Published: (2014)
by: Yang, J., et al.
Published: (2014)
Defining the meiotic functions of the checkpoint protein DPB11
by: Garnell, Thomas
Published: (2024)
by: Garnell, Thomas
Published: (2024)
The current status of checkpoint inhibitors in metastatic bladder cancer
by: Fahmy Ahmed, Omar Ahmed, et al.
Published: (2016)
by: Fahmy Ahmed, Omar Ahmed, et al.
Published: (2016)
Parallel implementation for HSLO(3)-FDTD with message passing interface on distributed memory architecture
by: Hasan, Mohammad Khatim, et al.
Published: (2006)
by: Hasan, Mohammad Khatim, et al.
Published: (2006)
Immune checkpoint inhibition: Prospects for prevention and therapy of hepatocellular carcinoma
by: Elsegood, Caryn, et al.
Published: (2017)
by: Elsegood, Caryn, et al.
Published: (2017)
The relationships between message passing, pairwise, Kermack–McKendrick and stochastic SIR epidemic models
by: Wilkinson, Robert R., et al.
Published: (2017)
by: Wilkinson, Robert R., et al.
Published: (2017)
High performance computing of explicit schemes for electrofusion jointing process based on message-passing paradigm
by: Osman, Halijah, et al.
Published: (2005)
by: Osman, Halijah, et al.
Published: (2005)
Design and Study for the Algorithm of Multimedia Messaging Service (MMS) Framework in Message Delivery
by: Setyono, Andik, et al.
Published: (2009)
by: Setyono, Andik, et al.
Published: (2009)
Tuning coordination in s-block carbazol-9-yl complexes
by: Ortu, Fabrizio, et al.
Published: (2015)
by: Ortu, Fabrizio, et al.
Published: (2015)
Aging induces increased expression of checkpoint inhibitory molecules on dendritic cells
by: Gardner, J., et al.
Published: (2016)
by: Gardner, J., et al.
Published: (2016)
Checkpointing in selected most fitted resource task scheduling in grid computing
by: Latip, Rohaya, et al.
Published: (2012)
by: Latip, Rohaya, et al.
Published: (2012)
Checkpoint localization for hikers using Havaersine Formula / Mohd Haizat Mat Isa
by: Mat Isa, Mohd Haizat
Published: (2015)
by: Mat Isa, Mohd Haizat
Published: (2015)
The programming primitives effects of the overlapping message-passing and computation in Beowulf cluster computing / Mohamed Faidz Mohamed Said
by: Mohamed Said, Mohamed Faidz
Published: (2015)
by: Mohamed Said, Mohamed Faidz
Published: (2015)
The programming primitives effects of the overlapping message-passing and computation in beowulf cluster computing / Mohamed Faidz Mohamed Said
by: Mohamed Said, Mohamed Faidz
Published: (2014)
by: Mohamed Said, Mohamed Faidz
Published: (2014)
Alignment Checkpoints Model for Evaluating Strategic Information Systems Planning in a Financial Organization in Malaysia
by: Adnan, Azman
Published: (2011)
by: Adnan, Azman
Published: (2011)
Distributed Preemptive Process
Management With Checkpointing And
Migration For A Linux-Based Grid
Operating System
by: Htin, Paw Oo @ Nur Hussein
Published: (2006)
by: Htin, Paw Oo @ Nur Hussein
Published: (2006)
Cohesive token passing algorithm utilizing software agents
by: Abdulrazzak, A. Fua’ad, et al.
Published: (2010)
by: Abdulrazzak, A. Fua’ad, et al.
Published: (2010)
Cryptanalysis of PASS II and MiniPass
by: Goi, , BM, et al.
Published: (2005)
by: Goi, , BM, et al.
Published: (2005)
Adaptive algorithms for automated intruder detection in surveillance networks
by: Ahmed, Tarem, et al.
Published: (2014)
by: Ahmed, Tarem, et al.
Published: (2014)
Performance analysis of Message Passing Interface collective communication on intel xeon quad-core gigabit ethernet and infiniband clusters
by: Ismail, Roswan, et al.
Published: (2013)
by: Ismail, Roswan, et al.
Published: (2013)
Analyzing trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Automated surveillance in distributed, visual networks: an empirical comparison of recent algorithms
by: Ahmed, Tarem, et al.
Published: (2014)
by: Ahmed, Tarem, et al.
Published: (2014)
PMDA: A malicious peer detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2011)
by: Wei, Xianglin, et al.
Published: (2011)
Editorial article: on the boundaries of trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Parallel computing via message passing: comparison between Microsoft MPI and Klyng framework / Nik Nasrul Faiz Nik Yahaya
by: Nik Yahaya, Nik Nasrul Faiz
Published: (2017)
by: Nik Yahaya, Nik Nasrul Faiz
Published: (2017)
"무선 센서 네트워크에서 센서 노드들 사이의 메시지 암호화/복호화 방법" (Translated TITLE: Message encryption/ecryption method between sensor nodes in wireless sensor networks)
by: Pathan, Al-Sakib Khan, et al.
Published: (2010)
by: Pathan, Al-Sakib Khan, et al.
Published: (2010)
An efficient data replication technique with fault tolerance approach using BVAG with checkpoint and rollback-recovery
by: Sharifah Hafizah, Syed Ahmad Ubaidillah, et al.
Published: (2021)
by: Sharifah Hafizah, Syed Ahmad Ubaidillah, et al.
Published: (2021)
The English verb: factual and non-factual message
by: Hashim, Siti Afifah, et al.
Published: (2009)
by: Hashim, Siti Afifah, et al.
Published: (2009)
PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA
by: Wei, Xianglin, et al.
Published: (2012)
by: Wei, Xianglin, et al.
Published: (2012)
Passing of Time
by: Slatter, Nicole
Published: (2015)
by: Slatter, Nicole
Published: (2015)
Arguments passing
by: Hakro, Dil Nawaz, et al.
Published: (2011)
by: Hakro, Dil Nawaz, et al.
Published: (2011)
Similar Items
-
A new efficient checkpointing algorithm for distributed mobile computing
by: Mansouri, Houssem, et al.
Published: (2015) -
Adaptive fault tolerant checkpointing algorithm for cluster based mobile Ad Hoc networks
by: Mansour, Houssem, et al.
Published: (2015) -
Strengths and weaknesses of prominent data dissemination techniques in wireless sensor networks
by: Guerroumi, Mohamed, et al.
Published: (2013) -
On the medium access control protocols suitable for wireless sensor networks – a survey
by: Guerroumi, Mohamed, et al.
Published: (2014) -
Parallelization of prime number generation using message passing interface
by: I.A., Aziz, et al.
Published: (2008)