Mobile computing allows ubiquitous and continuous access to computing resources while the users travel or work at a client's site. The flexibility introduced by mobile computing brings new challenges to the area of fault tolerance. Failures that were rare with fixed hosts become common, and host disconnection makes fault detection and message coordination difficult. This paper describes a new checkpoint protocol that is well adapted to mobile environments. The protocol uses time to indirectly coordinate the creation of new global states, avoiding all message exchanges. The protocol uses two different types of checkpoints to adapt to the current network characteristics, and to trade off performance with recovery time. 1 Introduction M...
In this thesis, we have proposed an efficient recovery mechanism for the mobile computing environmen...
[[abstract]]Time-based coordinated checkpointing protocols are well suited for mobile computing syst...
To provide the fault-tolerance for the mobile computing systems, many checkpointing-based recovery s...
Mobile computing allows ubiquitous and continuous access to computing resources while the users trav...
Abstract Mobile computing allows ubiquitous and continuous access to computing resources while users...
The article proposes a recovery protocol for applications in large mobile computing environment by c...
Mobile computing systems are expected to revolutionize the way computers are used. Mobile hosts have...
This paper presents an efficient recovery scheme to provide fault-tolerance for the mobile computing...
Information systems consist of multiple mobile stations and fixed stations communicating with each o...
Checkpointing is one of the commonly used techniques to provide fault-tolerance in distributed syste...
Checkpoint is defined as a designated place in a program at which normal process is interrupted spec...
Mobile agent become very popular and attracted more importance these days due to the exponential gro...
An efficient fault tolerant algorithm based on movement-based secure checkpointing and logging for m...
93 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2000.Traditional checkpoint interva...
Mobile networks have been quickly adopted by many companies and individuals. However, multiple facto...
In this thesis, we have proposed an efficient recovery mechanism for the mobile computing environmen...
[[abstract]]Time-based coordinated checkpointing protocols are well suited for mobile computing syst...
To provide the fault-tolerance for the mobile computing systems, many checkpointing-based recovery s...
Mobile computing allows ubiquitous and continuous access to computing resources while the users trav...
Abstract Mobile computing allows ubiquitous and continuous access to computing resources while users...
The article proposes a recovery protocol for applications in large mobile computing environment by c...
Mobile computing systems are expected to revolutionize the way computers are used. Mobile hosts have...
This paper presents an efficient recovery scheme to provide fault-tolerance for the mobile computing...
Information systems consist of multiple mobile stations and fixed stations communicating with each o...
Checkpointing is one of the commonly used techniques to provide fault-tolerance in distributed syste...
Checkpoint is defined as a designated place in a program at which normal process is interrupted spec...
Mobile agent become very popular and attracted more importance these days due to the exponential gro...
An efficient fault tolerant algorithm based on movement-based secure checkpointing and logging for m...
93 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2000.Traditional checkpoint interva...
Mobile networks have been quickly adopted by many companies and individuals. However, multiple facto...
In this thesis, we have proposed an efficient recovery mechanism for the mobile computing environmen...
[[abstract]]Time-based coordinated checkpointing protocols are well suited for mobile computing syst...
To provide the fault-tolerance for the mobile computing systems, many checkpointing-based recovery s...