An efficient fault tolerant algorithm based on movement-based secure checkpointing and logging for mobile computing system is proposed here. The recovery scheme proposed here combines independent checkpointing and message logging. Here we consider mobility rate of the user in checkpointing so that mobile host can manage recovery information such as checkpoints and logs properly so that a mobile host takes less recovery time after failure. Mobile hosts save checkpoints when number of hand-off exceeds a predefined hand-off threshold value. Current approaches save logs in base station. But this approach maximizes recovery time if message passing frequency is large. If a mobile host saves log in its own memory, recovery cost will be less becaus...
Information systems consist of multiple mobile stations and fixed stations communicating with each o...
Traditional message passing based checkpointing and rollback recovery algorithms perform well for cl...
Many mathematical models have been proposed to evaluate the execution performance of an application ...
The article proposes a recovery protocol for applications in large mobile computing environment by c...
This paper presents an efficient recovery scheme to provide fault-tolerance for the mobile computing...
This paper presents an efficient scheme to implement the optimistic message logging and the asynchro...
In this thesis, we have proposed an efficient recovery mechanism for the mobile computing environmen...
Mobile computing allows ubiquitous and continuous access to computing resources while the users trav...
To provide the fault-tolerance for the mobile computing systems, many checkpointing-based recovery s...
Mobile computing systems are expected to revolutionize the way computers are used. Mobile hosts have...
AbstractThe rapid development of communication technology and mobile devices has facilitated the mob...
Abstract Mobile computing allows ubiquitous and continuous access to computing resources while users...
AbstractMobile ad hoc networks (MANETs) have significantly enhanced the wireless networks by elimina...
Checkpoint is defined as a designated place in a program at which normal process is interrupted spec...
Mobile Distributed Systems (MDS) are susceptible to faults. It is not easy to predict whether the sy...
Information systems consist of multiple mobile stations and fixed stations communicating with each o...
Traditional message passing based checkpointing and rollback recovery algorithms perform well for cl...
Many mathematical models have been proposed to evaluate the execution performance of an application ...
The article proposes a recovery protocol for applications in large mobile computing environment by c...
This paper presents an efficient recovery scheme to provide fault-tolerance for the mobile computing...
This paper presents an efficient scheme to implement the optimistic message logging and the asynchro...
In this thesis, we have proposed an efficient recovery mechanism for the mobile computing environmen...
Mobile computing allows ubiquitous and continuous access to computing resources while the users trav...
To provide the fault-tolerance for the mobile computing systems, many checkpointing-based recovery s...
Mobile computing systems are expected to revolutionize the way computers are used. Mobile hosts have...
AbstractThe rapid development of communication technology and mobile devices has facilitated the mob...
Abstract Mobile computing allows ubiquitous and continuous access to computing resources while users...
AbstractMobile ad hoc networks (MANETs) have significantly enhanced the wireless networks by elimina...
Checkpoint is defined as a designated place in a program at which normal process is interrupted spec...
Mobile Distributed Systems (MDS) are susceptible to faults. It is not easy to predict whether the sy...
Information systems consist of multiple mobile stations and fixed stations communicating with each o...
Traditional message passing based checkpointing and rollback recovery algorithms perform well for cl...
Many mathematical models have been proposed to evaluate the execution performance of an application ...