A hybrid message logging-CIC protocol for constrained Checkpointability

9Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Communication Induced Checkpointing protocols usually make the assumption that any process can be checkpointed at any time. We propose an alternative approach which releases the constraint of always checkpointable processes, without delaying any message reception nor altering message ordering enforced by the communication layer or by the application. This protocol has been implemented within ProActive, an open source Java middleware for asynchronous and distributed objects implementing the ASP (Asynchronous Sequential Processes) model. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Baude, F., Caromel, D., Delbé, C., & Henrio, L. (2005). A hybrid message logging-CIC protocol for constrained Checkpointability. In Lecture Notes in Computer Science (Vol. 3648, pp. 644–653). Springer Verlag. https://doi.org/10.1007/11549468_71

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free