Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,536,297 papers from all fields of science
Search
Sign In
Create Free Account
Application checkpointing
Known as:
CryoPID
, Checkpoint
, System checkpointing
Expand
Checkpointing is a technique to add fault tolerance into computing systems. It basically consists of saving a snapshot of the application's state, so…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
29 relations
Application Interface Specification
Computer cluster
Consistency model
Distributed computing
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
Minimum Process Coordinated Checkpointing Scheme for Ad Hoc Networks
Ruchi Tuli
,
Parveen Kumar
arXiv.org
2011
Corpus ID: 8375510
The wireless mobile ad hoc network (MANET) architecture is one consisting of a set of mobile hosts capable of communicating with…
Expand
2006
2006
A New High Performance Checkpointing Approach for Mobile Computing Systems
B. Gupta
,
S. Rahimi
,
Ziping Liu
2006
Corpus ID: 18027592
Summary In this paper, we present a single phase non-blocking coordinated checkpointing algorithm suitable for mobile computing…
Expand
2001
2001
Developing applications with Java and UML : プログラマーのための統一モデリング
Paul R. Reed
,
テクノロジックアート
,
長瀬 嘉秀
,
今野 睦
2001
Corpus ID: 60033211
第1章 プロジェクトのジレンマ 第2章 Java、オブジェクト指向分析・設計、UML 第3章 プロジェクトの開始 第4章 ユースケース 第5章 クラス 第6章 ユーザインタフェースのプロトタイプの構築 第7章 アプリケーションの動的要素 第8章 技術展望 第9章 オブジェクトの格納:データの永続性 第10章 インフラとアーキテクチャのレビュー 第11章 サーブレット、JSP、JavaBeanによる構築 第12章 サーブレット、JSP、EJBによる構築
2000
2000
Exploiting non-determinism for reliability of mobile agent systems
Ajay Mohindra
,
A. Purakayastha
,
P. Thati
Proceeding International Conference on Dependable…
2000
Corpus ID: 6028499
An important technical hurdle blocking the adoption of mobile agent technology is the lack of reliability. Designing a reliable…
Expand
1999
1999
NOMADS: Toward an Environment for Strong and Safe Agent Mobility1
Niranjan Suri
,
J. Bradshaw
,
+4 authors
David S. Smith
1999
Corpus ID: 18261449
NOMADS is a mobile agent system that aims to support strong mobility (i.e., the ability to capture and transfer the full…
Expand
1992
1992
Effect of Fault Tolerance on Response Time-Analysis of the Primary Site Approach
Yennun Huang
,
P. Jalote
IEEE Trans. Computers
1992
Corpus ID: 13459993
The effect of the primary site approach for fault tolerance on the response time is studied. In the primary site approach, the…
Expand
1992
1992
An evaluation of three function point models for estimation of software effort
D. Ferens
,
Robert B. Gurner
Proceedings of the IEEE National Aerospace and…
1992
Corpus ID: 60644807
It is pointed out that function point analysis has become well-established as a method for estimating software size and…
Expand
1986
1986
Checkpoint Faults are not Sufficient Target Faults for Test Generation
M. Abramovici
,
P. R. Menon
,
David T. Miller
IEEE transactions on computers
1986
Corpus ID: 1827058
Stuck-at faults on primary inputs and fan-out branches are commonly used as target faults in test generation algorithms for…
Expand
1983
1983
Checkpoint and Restart in Distributed Transaction Systems
J. Moss
Symposium on Reliability in Distributed Software…
1983
Corpus ID: 7466587
1971
1971
Logic Design for Dynamic and Interactive Recovery
W. Carter
,
D. C. Jessep
,
A. Wadia
,
P. R. Schneider
,
W. G. Bouricius
IEEE transactions on computers
1971
Corpus ID: 29481868
Recovery in a fault-tolerant computer means the continuation of system operation with data integrity after an error occurs. This…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE