Abstract
Communication Induced Checkpointing protocols usually make the assumption that any process can be checkpointed at any time. We propose an alternative approach which releases the constraint of always checkpointable processes, without delaying any message reception nor altering message ordering enforced by the communication layer or by the application. This protocol has been implemented within ProActive, an open source Java middleware for asynchronous and distributed objects implementing the ASP (Asynchronous Sequential Processes) model. © Springer-Verlag Berlin Heidelberg 2005.
Cite
CITATION STYLE
Baude, F., Caromel, D., Delbé, C., & Henrio, L. (2005). A hybrid message logging-CIC protocol for constrained Checkpointability. In Lecture Notes in Computer Science (Vol. 3648, pp. 644–653). Springer Verlag. https://doi.org/10.1007/11549468_71
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.