Author:
Islam Tanzima Zerin,Bagchi Saurabh,Eigenmann Rudolf
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Information Systems,Software
Reference23 articles.
1. Ryu, K., Hollingsworth, J.: Resource policing to support fine-grain cycle stealing in networks of workstations. IEEE Trans. Parallel Distrib. Syst., 878–892 (2004)
2. Elnozahy, E. N. M., Alvisi, L., Wang, Y., Johnson, D. B.: A survey of rollback-recovery protocols in message-passing systems. ACM Comput. Surv. (CSUR) 34(3), 375–408 (2002)
3. Thain, D., Tannenbaum, T., Livny, M.: Distributed computing in practice: The Condor experience. Concurr. Pract. Experience 17(2–4), 323–356 (2005)
4. Boilergrid: A large, high-throughput, distributed computing system. [Online]. Available: http://www.rcac.purdue.edu/userinfo/resources/boilergrid/
5. Aguilera, M. K., Janakiraman, R., Xu, L.: Using erasure codes efficiently for storage in a distributed system. In: International Conference on Dependable Systems and Networks (DSN), pp. 336–345 (2005)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. The Optimal Checkpoint Interval for the Long-Running Application;Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing;2021
2. Fault tolerance based load balancing approach for web resources;Journal of the Chinese Institute of Engineers;2019-07-16
3. The Checkpoint-Timing for Backward Fault-Tolerant Schemes;Communications in Computer and Information Science;2018
4. The Optimal Checkpoint Interval for the Long-Running Application;International Journal of Advanced Pervasive and Ubiquitous Computing;2017-04