1 |
Y. Wang and H. Wu, 'DFT-MSN: The Delay Fault Tolerant Mobile Sensor Network for Pervasive Information Gathering,' Proceedings of IEEE International Conference on Computer Communications, pp.25-38, Apr., 2006
DOI
|
2 |
A. Bohra, et al., 'Remote Repair of Operating System State using Backdoors,' Proceedings of IEEE International Conference on Autonomic Computing, pp.256-263, May, 2004
DOI
|
3 |
F. Sultan, et al., 'Nonintrusive Remote Healing Using Backdoors,' Proceedings of Algorithms and Architectures for Self-Managing Systems, pp.69-74. June, 2003
|
4 |
C. Rao, L. Alvisi, and H. Yin, 'The Cost of Recovery in Message Logging Protocols,' Proceedings of IEEE Symposium on Reliable Distributed Systems, pp.10-18, Oct., 1998
|
5 |
A. Krohn, et al., 'TOMAC - Real-time Message Ordering in Wireless Sensor Networks Using The MAC Layer,' Proceedings of International Conference on Networked Sensing Systems, pp.377-381, June, 2005
|
6 |
J. Tasi, 'An Efficient Index-based Checkpointing Protocol with Constant-size Control Information on Messages,' IEEE Transactions on Dependable and Secure Computing, Vol. 2, No.4, pp.287-296, Oct., 2005
DOI
ScienceOn
|
7 |
L. Alvisi, et al., 'An Analysis of Communication Induced Checkpointing,' Proceedings of IEEE International Conference on Fault-Tolerant Computing, pp.242-249, June, 1999
DOI
|
8 |
D. Johnson and W. Zwaenepoel, 'Sender-based Message Logging,' Proceedings of International Symposium on Fault-Tolerant Computing, pp.14-19, July, 1987
|
9 |
J. Helary, et al., 'Communication-based Prevention of Useless Checkpoints in Distributed Computations,' Journal of Distributed Computing, Vol.13, No.1, pp.29-43, Jan., 2000
DOI
|
10 |
J. Cao, Y. Li, and M. Guo, 'Process Migration MPI Applications based on Coordinated Checkpoint,' Proceedings of International Conference on Parallel Distributed Systems, pp.306-312, July, 2005
DOI
|
11 |
L. Alvisi and K. Marzullo, 'MessageLogging: Pessimistic, Optimistic, Causal, and Optimal,' IEEE Transactions on Software Engineering, Vol. 24, No.2, pp.149-159, Feb., 1998
DOI
ScienceOn
|
12 |
E. Shih, et al., 'Physical Layer Driven Protocol and Algorithm Design for Energy-Efficient Wireless Sensor Network,' Proceedings of Mobile Computing and Networking, pp.272-287, July, 2001
DOI
|
13 |
T. Juang and S. Venkatesan, 'Crash Recovery with Little Overhead,' Proceedings of IEEE International Conference on Distributed Computing Systems, pp.454-461, May, 1991
DOI
|
14 |
C. Intanagonwiwat, R. Govindan, and D. Estrin, 'Directed diffusion: a scalable and robust communication paradigm for sensor networks,' Proceedings of Mobile Computing, pp.56-67, Aug., 2000
|
15 |
E. Elnozahy and W. Zwaenepoel, 'Manetho: Transparent Rollback-recovery with Low Overhead, Limited Rollback and Fast Output,' IEEE Transactions on Computers, Vol.41, No.5, pp.526-531, May, 1992
DOI
ScienceOn
|
16 |
M. Prvulovic, Z. Zhang, and J. Torrellas, 'ReVive: Cost-Effective Architectural Support for Rollback Recovery in Shared-Memory Multiprocessors,' Proceedings of Computer Architecture, pp. 111-122, May 2002
DOI
|
17 |
A. Bouteiller, et al., 'Coordinated Checkpoint versus Message Log for Fault Tolerant MPI,' Proceedings of IEEE International Conference on Cluster Computing, pp. 242-250, Dec. 2003
DOI
|
18 |
M. Elnozahy and L. Alvisi, 'A Survey of Rollback-recovery Protocols in Message-passing System,' ACM Computing Surveys, Vol. 34, pp. 375-409, Sep. 2002
DOI
ScienceOn
|
19 |
M. Burrows, et al., 'Compressed Differences: An Algorithm for Fast Incremental Checkpoint,' Proceedings of Architectural Support for Programming Languages and Operating Systems, pp. 2-9, Oct. 1992
|