<p>(a) <i>u = O<sub>i</sub>/O<sub>m</sub></i> = 10%; (b) <i>u = O<sub>i</sub>/O<sub>m</sub></i> = 30%; (c) <i>u = O<sub>i</sub>/O<sub>m</sub></i> = 33%; (d) <i>u = O<sub>i</sub>/O<sub>m</sub></i> = 40%.</p
Checkpointing and rollback is a technique to minimize the loss of computation in the presence of fai...
<p>Results for five different restoration strategies: (1) <i>p<sub>r</sub></i> = 0 (black diamonds);...
International audienceIn this paper, we present a unified model for several well-known checkpoint/re...
<p>(a) <i>u = O<sub>i</sub>/O<sub>m</sub></i> = 10%; (b) <i>u = O<sub>i</sub>/O<sub>m</sub></i> = 12...
<p>(a) The relationship between the total overheads of setting checkpoints and the number of failure...
<p>(a) The relationship between the total overheads of setting checkpoints and the completion time; ...
Long-running applications are often subject to failures. Once failures occur, it will lead to unacce...
Most distributed and multiprocessor recovery schemes proposed in the literature are designed to tole...
Due to the character of the original source materials and the nature of batch digitization, quality ...
Abstract: Finding the failure rate of a system is a crucial step in high performance comput-ing syst...
AbstractIt is important to design computer systems to tolerate some failures. This paper proposes tw...
Performance evaluation of checkpoint rollback recovery strategies for distributed systems is a field...
<p>The comparison of the results for different interim monitoring plans under the exponential distri...
Finding the failure rate of a system is a crucial step in high performance computing systems analysi...
对于成败型情形,基于成功次数给出了成功率的优良置信限和置信区间;对于产品寿命服从指数分布的情形,针对不同类型的数据(定数截尾、定时截尾、定总时与定数混合截尾、工型区间删失等)分别给出了可靠性参数(平均...
Checkpointing and rollback is a technique to minimize the loss of computation in the presence of fai...
<p>Results for five different restoration strategies: (1) <i>p<sub>r</sub></i> = 0 (black diamonds);...
International audienceIn this paper, we present a unified model for several well-known checkpoint/re...
<p>(a) <i>u = O<sub>i</sub>/O<sub>m</sub></i> = 10%; (b) <i>u = O<sub>i</sub>/O<sub>m</sub></i> = 12...
<p>(a) The relationship between the total overheads of setting checkpoints and the number of failure...
<p>(a) The relationship between the total overheads of setting checkpoints and the completion time; ...
Long-running applications are often subject to failures. Once failures occur, it will lead to unacce...
Most distributed and multiprocessor recovery schemes proposed in the literature are designed to tole...
Due to the character of the original source materials and the nature of batch digitization, quality ...
Abstract: Finding the failure rate of a system is a crucial step in high performance comput-ing syst...
AbstractIt is important to design computer systems to tolerate some failures. This paper proposes tw...
Performance evaluation of checkpoint rollback recovery strategies for distributed systems is a field...
<p>The comparison of the results for different interim monitoring plans under the exponential distri...
Finding the failure rate of a system is a crucial step in high performance computing systems analysi...
对于成败型情形,基于成功次数给出了成功率的优良置信限和置信区间;对于产品寿命服从指数分布的情形,针对不同类型的数据(定数截尾、定时截尾、定总时与定数混合截尾、工型区间删失等)分别给出了可靠性参数(平均...
Checkpointing and rollback is a technique to minimize the loss of computation in the presence of fai...
<p>Results for five different restoration strategies: (1) <i>p<sub>r</sub></i> = 0 (black diamonds);...
International audienceIn this paper, we present a unified model for several well-known checkpoint/re...