References
- M. Burrows, et al., 'Compressed Differences: An Algorithm for Fast Incremental Checkpoint,' Proceedings of Architectural Support for Programming Languages and Operating Systems, pp. 2-9, Oct. 1992
- M. Prvulovic, Z. Zhang, and J. Torrellas, 'ReVive: Cost-Effective Architectural Support for Rollback Recovery in Shared-Memory Multiprocessors,' Proceedings of Computer Architecture, pp. 111-122, May 2002 https://doi.org/10.1109/ISCA.2002.1003567
- A. Bouteiller, et al., 'Coordinated Checkpoint versus Message Log for Fault Tolerant MPI,' Proceedings of IEEE International Conference on Cluster Computing, pp. 242-250, Dec. 2003 https://doi.org/10.1109/CLUSTR.2003.1253321
- M. Elnozahy and L. Alvisi, 'A Survey of Rollback-recovery Protocols in Message-passing System,' ACM Computing Surveys, Vol. 34, pp. 375-409, Sep. 2002 https://doi.org/10.1145/568522.568525
- C. Intanagonwiwat, R. Govindan, and D. Estrin, 'Directed diffusion: a scalable and robust communication paradigm for sensor networks,' Proceedings of Mobile Computing, pp.56-67, Aug., 2000
- E. Elnozahy and W. Zwaenepoel, 'Manetho: Transparent Rollback-recovery with Low Overhead, Limited Rollback and Fast Output,' IEEE Transactions on Computers, Vol.41, No.5, pp.526-531, May, 1992 https://doi.org/10.1109/12.142678
- L. Alvisi and K. Marzullo, 'MessageLogging: Pessimistic, Optimistic, Causal, and Optimal,' IEEE Transactions on Software Engineering, Vol. 24, No.2, pp.149-159, Feb., 1998 https://doi.org/10.1109/32.666828
- T. Juang and S. Venkatesan, 'Crash Recovery with Little Overhead,' Proceedings of IEEE International Conference on Distributed Computing Systems, pp.454-461, May, 1991 https://doi.org/10.1109/ICDCS.1991.148709
- J. Cao, Y. Li, and M. Guo, 'Process Migration MPI Applications based on Coordinated Checkpoint,' Proceedings of International Conference on Parallel Distributed Systems, pp.306-312, July, 2005 https://doi.org/10.1109/ICPADS.2005.241
- J. Tasi, 'An Efficient Index-based Checkpointing Protocol with Constant-size Control Information on Messages,' IEEE Transactions on Dependable and Secure Computing, Vol. 2, No.4, pp.287-296, Oct., 2005 https://doi.org/10.1109/TDSC.2005.42
- J. Helary, et al., 'Communication-based Prevention of Useless Checkpoints in Distributed Computations,' Journal of Distributed Computing, Vol.13, No.1, pp.29-43, Jan., 2000 https://doi.org/10.1007/s004460050003
- A. Krohn, et al., 'TOMAC - Real-time Message Ordering in Wireless Sensor Networks Using The MAC Layer,' Proceedings of International Conference on Networked Sensing Systems, pp.377-381, June, 2005
- L. Alvisi, et al., 'An Analysis of Communication Induced Checkpointing,' Proceedings of IEEE International Conference on Fault-Tolerant Computing, pp.242-249, June, 1999 https://doi.org/10.1109/FTCS.1999.781058
- D. Johnson and W. Zwaenepoel, 'Sender-based Message Logging,' Proceedings of International Symposium on Fault-Tolerant Computing, pp.14-19, July, 1987
- A. Bohra, et al., 'Remote Repair of Operating System State using Backdoors,' Proceedings of IEEE International Conference on Autonomic Computing, pp.256-263, May, 2004 https://doi.org/10.1109/ICAC.2004.1301371
- F. Sultan, et al., 'Nonintrusive Remote Healing Using Backdoors,' Proceedings of Algorithms and Architectures for Self-Managing Systems, pp.69-74. June, 2003
- C. Rao, L. Alvisi, and H. Yin, 'The Cost of Recovery in Message Logging Protocols,' Proceedings of IEEE Symposium on Reliable Distributed Systems, pp.10-18, Oct., 1998
- Y. Wang and H. Wu, 'DFT-MSN: The Delay Fault Tolerant Mobile Sensor Network for Pervasive Information Gathering,' Proceedings of IEEE International Conference on Computer Communications, pp.25-38, Apr., 2006 https://doi.org/10.1109/INFOCOM.2006.272
- E. Shih, et al., 'Physical Layer Driven Protocol and Algorithm Design for Energy-Efficient Wireless Sensor Network,' Proceedings of Mobile Computing and Networking, pp.272-287, July, 2001 https://doi.org/10.1145/381677.381703