Enabling the execution of Java applications on personal embedded devices could bring great benefits to their users. For example, you could exchange your calendar application with your neighbor, or send your favorite telephone game to your friends without thinking if they have a compatible phone. Moreover, these devices will have to provide a reliable execution environment as soon as they will be implied in critical or distributed applications. Checkpoints capture/rollback recovery solves a part of this problem. This paper presents the integration of a checkpoint mechanism in our own embedded Java Virtual Machine named Scratchy. Our mechanism, is transparent for the user and has a low overhead on the applications. We propose one global and ...
The usage of cellular phones, PDAs, and other mobile de-vices has increased dramatically over the pa...
Checkpoint/rollback (CR) mechanisms create snapshots of the state of a running application, allowing...
Traditional checkpoint and recovery are based upon two basic assumptions. The first is the need to h...
Enabling the execution of Java applications on personal embedded devices could bring great benefits ...
Checkpointing is widely used in robust fault-tolerant applications. We present an efficient incremen...
Current work on persistency in Java does not consider.the execution environment of the threads and t...
Dual-execution/checkpointing based transient error tolerance techniques have been widely used in the...
Several techniques have been proposed for adding persistence to the Java language environment. This ...
Checkpointing and replaying is an attractive technique that has been used widely at the operating/ru...
Object-oriented programming languages presently are the dominant paradigm of application development...
International audienceWhile mobile devices have become ubiquitous and generally multi-application ca...
Object-oriented programming languages presently are the dominant paradigm of application development...
Several techniques have been proposed for adding persistence to the Java language environment. This ...
Many mathematical models have been proposed to evaluate the execution performance of an application ...
Object-oriented programming languages are in current days, the dominant paradigm of application deve...
The usage of cellular phones, PDAs, and other mobile de-vices has increased dramatically over the pa...
Checkpoint/rollback (CR) mechanisms create snapshots of the state of a running application, allowing...
Traditional checkpoint and recovery are based upon two basic assumptions. The first is the need to h...
Enabling the execution of Java applications on personal embedded devices could bring great benefits ...
Checkpointing is widely used in robust fault-tolerant applications. We present an efficient incremen...
Current work on persistency in Java does not consider.the execution environment of the threads and t...
Dual-execution/checkpointing based transient error tolerance techniques have been widely used in the...
Several techniques have been proposed for adding persistence to the Java language environment. This ...
Checkpointing and replaying is an attractive technique that has been used widely at the operating/ru...
Object-oriented programming languages presently are the dominant paradigm of application development...
International audienceWhile mobile devices have become ubiquitous and generally multi-application ca...
Object-oriented programming languages presently are the dominant paradigm of application development...
Several techniques have been proposed for adding persistence to the Java language environment. This ...
Many mathematical models have been proposed to evaluate the execution performance of an application ...
Object-oriented programming languages are in current days, the dominant paradigm of application deve...
The usage of cellular phones, PDAs, and other mobile de-vices has increased dramatically over the pa...
Checkpoint/rollback (CR) mechanisms create snapshots of the state of a running application, allowing...
Traditional checkpoint and recovery are based upon two basic assumptions. The first is the need to h...