A survey of rollback-recovery protocols in message-passing systems.
This survey covers rollback-recovery techniques that do not require special language constructs. In the first part of the survey we classify rollback-recovery protocols into checkpoint-based and log-based. Checkpoint-based protocols rely solely on checkpointing for system state restoration. Checkpoi...
| الحاوية / القاعدة: | ACM computing surveys. 34, 3 (2002). |
|---|---|
| المؤلف الرئيسي: | |
| مؤلفون آخرون: | , , |
| التنسيق: | مقال |
| اللغة: | English |
| الموضوعات: |