• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,666
Next 10 →

Table 1: Evaluating rollback-recovery mechanisms.

in Fingerprinting: Bounding Soft-Error Detection Latency and Bandwidth
by Jared C. Smolens, Brian T. Gold, Jangwoo Kim, Babak Falsafi, James C. Hoe, Andreas G. Nowatzyk 2004
"... In PAGE 4: ... From the above discussion, there are contradicting de- mands on the checkpoint interval by I/O performance and error coverage requirements. Table1 summarizes the oppos- ing factors when trying to balance I/O performance, error coverage, and comparison bandwidth in choosing a DMR de- tection mechanisms. Only ngerprinting, presented in detail in the next section, can simultaneously satisfy all require- ments of high error coverage, low detection bandwidth, and high I/O throughput.... ..."
Cited by 26

Table 1: Evaluating rollback-recovery mechanisms.

in Fingerprinting: Bounding soft-error detection latency and bandwidth
by Jared C. Smolens, Brian T. Gold, Jangwoo Kim, Babak Falsafi, James C. Hoe, Andreas G. Nowatzyk 2004
"... In PAGE 4: ... From the above discussion, there are contradicting de- mands on the checkpoint interval by I/O performance and error coverage requirements. Table1 summarizes the oppos- ing factors when trying to balance I/O performance, error coverage, and comparison bandwidth in choosing a DMR de- tection mechanisms. Only ngerprinting, presented in detail in the next section, can simultaneously satisfy all require- ments of high error coverage, low detection bandwidth, and high I/O throughput.... ..."
Cited by 26

Table 1: Comparison between different flavors of rollback-recovery protocols.

in A Survey of Rollback-Recovery Protocols in Message-Passing Systems
by E. N. Elnozahy, D. B. Johnson, Y. M. Wang 1996
"... In PAGE 28: ...4 Comparison Various rollback-recovery protocols offer different tradeoffs with respect to perfor- mance overhead, latency of output commit, storage overhead, ease of garbage col- lection, simplicity of recovery, freedom from domino effect, freedom from orphan processes, and the extent of rollback. Table1 summarizes the comparison between the different variations of rollback-recovery protocols. Uncoordinated checkpointing generally has the lowest failure-free overhead but suffers from potential domino ef- fect.... ..."
Cited by 367

Table 1: Comparison between different flavors of rollback-recovery protocols.

in A Survey of Rollback-Recovery Protocols in Message-Passing Systems
by E. N. Elnozahy , D. B. Johnson, Y. M. Wang 1996
"... In PAGE 28: ...4 Comparison Various rollback-recovery protocols offer different tradeoffs with respect to perfor- mance overhead, latency of output commit, storage overhead, ease of garbage col- lection, simplicity of recovery, freedom from domino effect, freedom from orphan processes, and the extent of rollback. Table1 summarizes the comparison between the different variations of rollback-recovery protocols. Uncoordinated checkpointing generally has the lowest failure-free overhead but suffers from potential domino ef- fect.... ..."
Cited by 367

Table 1: Comparison between different flavors of rollback-recovery protocols.

in A survey of rollback-recovery protocols in message-passing systems
by E. N. Elnozahy, D. B. Johnson, Y. M. Wang 1996
"... In PAGE 28: ...4 Comparison Various rollback-recovery protocols offer different tradeoffs with respect to perfor- mance overhead, latency of output commit, storage overhead, ease of garbage col- lection, simplicity of recovery, freedom from domino effect, freedom from orphan processes, and the extent of rollback. Table1 summarizes the comparison between the different variations of rollback-recovery protocols. Uncoordinated checkpointing generally has the lowest failure-free overhead but suffers from potential domino ef- fect.... ..."
Cited by 367

Table 1. Comparison between different styles of rollback-recovery protocols.

in unknown title
by unknown authors 1996
"... In PAGE 23: ...5 Comparison Different rollback-recovery protocols offer different tradeoffs with respect to properties such as performance overhead, latency of output commit, storage overhead, ease of garbage collection, simplicity of recovery, freedom from domino effect, freedom from orphan processes, and the extent of rollback. Table1 provides a brief comparison between the different styles of rollback-recovery protocols. Since garbage collection and recovery both involve calculating a recovery line, they can be performed by simple procedures under coordinated checkpointing and pessimistic logging, both of which have a predetermined recovery line during failure-free execution.... ..."
Cited by 367

Table 1 Comparison between different flavors of rollback-recovery protocols.

in unknown title
by unknown authors 1996
"... In PAGE 20: ...5 Comparison Different rollback-recovery protocols offer different tradeoffs with respect to performance overhead, latency of output commit, storage overhead, ease of garbage collection, simplicity of recovery, freedom from domino effect, freedom from orphan processes, and the extent of rollback. Table1 summarizes a comparison between the different variations of rollback-recovery protocols. Since garbage collection and recovery both involve calculating a recovery line, they can be performed by simple procedures under coordinated checkpointing and pessimistic logging, both of which have a predetermined recovery line during failure-free execution.... ..."
Cited by 367

Table 1. Comparison between different styles of rollback-recovery protocols.

in unknown title
by unknown authors 1996
"... In PAGE 23: ...5 Comparison Different rollback-recovery protocols offer different tradeoffs with respect to properties such as performance overhead, latency of output commit, storage overhead, ease of garbage collection, simplicity of recovery, freedom from domino effect, freedom from orphan processes, and the extent of rollback. Table1 provides a brief comparison between the different styles of rollback-recovery protocols. Since garbage collection and recovery both involve calculating a recovery line, they can be performed by simple procedures under coordinated checkpointing and pessimistic logging, both of which have a predetermined recovery line during failure-free execution.... ..."
Cited by 367

Table 1 Comparison between different flavors of rollback-recovery protocols.

in unknown title
by unknown authors
"... In PAGE 20: ...5 Comparison Different rollback-recovery protocols offer different tradeoffs with respect to performance overhead, latency of output commit, storage overhead, ease of garbage collection, simplicity of recovery, freedom from domino effect, freedom from orphan processes, and the extent of rollback. Table1 summarizes a comparison between the different variations of rollback-recovery protocols. Since garbage collection and recovery both involve calculating a recovery line, they can be performed by simple procedures under coordinated checkpointing and pessimistic logging, both of which have a predetermined recovery line during failure-free execution.... ..."

Table 1 Comparison between different flavors of rollback-recovery protocols.

in unknown title
by unknown authors
"... In PAGE 20: ...5 Comparison Different rollback-recovery protocols offer different tradeoffs with respect to performance overhead, latency of output commit, storage overhead, ease of garbage collection, simplicity of recovery, freedom from domino effect, freedom from orphan processes, and the extent of rollback. Table1 summarizes a comparison between the different variations of rollback-recovery protocols. Since garbage collection and recovery both involve calculating a recovery line, they can be performed by simple procedures under coordinated checkpointing and pessimistic logging, both of which have a predetermined recovery line during failure-free execution.... ..."
Next 10 →
Results 1 - 10 of 1,666
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University