Phoenix/App supports software components whose states are made persistent across a system crash via redo recovery, replaying logged interactions. Our initial prototype force logged all request/reply events resulting from inter-component method calls and returns. This paper describes an enhanced prototype that implements: (i) log optimizations to improve normal execution performance; and (ii) checkpointing to improve recovery performance. Logging is reduced in two ways: (1) we only log information required to remove non-determinism, and we only force the log when an event “commits ” the state of the component to other parts of the system; (2) we introduce new component types that provide our enhanced system with more information, enabling fu...
This survey covers rollback-recovery techniques that do not require special language constructs. In ...
Nowadays, due to the increased user requirements of the fast and reliable data management operation ...
93 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2000.Traditional checkpoint interva...
Building highly available enterprise applications using web-oriented middleware is hard. Runtime imp...
Building highly available enterprise applications using web-oriented middleware is hard. Runtime i...
this paper we will use this case to illustrate our logging model. However, the general treatment of ...
The article proposes a recovery protocol for applications in large mobile computing environment by c...
Database recovery does not mask failures to applications and users. Recovery is needed that consider...
The client-server architecture is used widely throughout complex software systems, but is susceptibl...
In this thesis, we have proposed an efficient recovery mechanism for the mobile computing environmen...
Although existing write-ahead logging algorithms scale to conventional database workloads, their com...
Message logging protocols are an integral part of a technique for implementing processes that can re...
Agnostic fault-tolerant systems cannot recover to a consistent state if a failure/crash occurs durin...
This paper presents an efficient scheme to implement the optimistic message logging and the asynchro...
This survey covers rollback-recovery techniques that do not require special language constructs. In ...
This survey covers rollback-recovery techniques that do not require special language constructs. In ...
Nowadays, due to the increased user requirements of the fast and reliable data management operation ...
93 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2000.Traditional checkpoint interva...
Building highly available enterprise applications using web-oriented middleware is hard. Runtime imp...
Building highly available enterprise applications using web-oriented middleware is hard. Runtime i...
this paper we will use this case to illustrate our logging model. However, the general treatment of ...
The article proposes a recovery protocol for applications in large mobile computing environment by c...
Database recovery does not mask failures to applications and users. Recovery is needed that consider...
The client-server architecture is used widely throughout complex software systems, but is susceptibl...
In this thesis, we have proposed an efficient recovery mechanism for the mobile computing environmen...
Although existing write-ahead logging algorithms scale to conventional database workloads, their com...
Message logging protocols are an integral part of a technique for implementing processes that can re...
Agnostic fault-tolerant systems cannot recover to a consistent state if a failure/crash occurs durin...
This paper presents an efficient scheme to implement the optimistic message logging and the asynchro...
This survey covers rollback-recovery techniques that do not require special language constructs. In ...
This survey covers rollback-recovery techniques that do not require special language constructs. In ...
Nowadays, due to the increased user requirements of the fast and reliable data management operation ...
93 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2000.Traditional checkpoint interva...