[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article
Free access

Optimization criteria for checkpoint placement

Published: 01 October 1984 Publication History

Abstract

Mean response time and availability as optimization criteria for checkpoint placement are better replaced by workable formulas that calculate the ratio between the marginal gain accrued to users who experience system failure and the (presumably slight) loss suffered on average by all users.

References

[1]
Baccelli, F, Analysis of a service facility with periodic checkpointing. Acta Inf. 15, 1 (1981), 67-81.
[2]
Brodetskiy, G.L. Periodic dumping of intermediate results in systems with storage-destructive failures. Eng. Cybern. 15, 5 (Sept.-Oct. 1979), 685-689.
[3]
Chandy. K.M. Browne. J.C., Dissly. C.W., and Uhrig, W.R. Analytic models for rollback and recovery strategies in data base systems. IEEE Trans. Softw. Eng, SE-1.1 (Mar. 1975), 100-110.
[4]
Chandy, K.M., and Ramamoorthy. C.V. Rollback and recovery strategies for computer programs. IEEE Trans. Comput. C-21, 6 (June 1972), 546-556.
[5]
Gelenbe, E. On the optimum checkpoint interval. J. ACM 26, 2 (Apr. 1979), 259-270.
[6]
Gelenbe, E., and Derochette, D. Performance of rollback recovery systems under intermittent failures. Commun. ACM 21, 6 (June 1978), 493-499.
[7]
Krishna, C.M., and Shin. K.G. Performance measures for real-time controllers. In Performance 83, A, Agrawala and S.K. Trlpathi, Eds. North-Holland, Amsterdam, 1983, pp. 229-250.
[8]
Shin, K.G., Krishna, C.M. and Lee, Y.-H. Unified methods for evaluating real-time controllers: A case study. Computing Research Laboratory Rep. CRL-TR-23, The Univ. of Michigan, Ann Arbor, June 1983.
[9]
Tantawi, A.N., and Ruschitzka. M. Performance analysis of checkpointing strategies. In Proceedings of the ACM SIGMETRICS Conference on Measurement and Modeling of Computer Systems (Minneapolis, Minn., Aug. 29-31). ACM, New York, 1983, p. 129.
[10]
Young, J,W. A first order approximation to the optimum checkpoint interval. Commun. ACM 17, 9 (Sept. 1974), 530-531.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 27, Issue 10
Oct 1984
70 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/358274
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 October 1984
Published in CACM Volume 27, Issue 10

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)79
  • Downloads (Last 6 weeks)13
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)On-the-fly, incremental, consistent reading of entire databasesAlgorithmica10.1007/BF018404481:1-4(271-287)Online publication date: 22-Mar-2023
  • (2021)CheckpointingFault-Tolerant Systems10.1016/B978-0-12-818105-8.00016-4(203-235)Online publication date: 2021
  • (2015)An aperiodic checkpointing strategy in desktop gridsInternational Journal of Computational Science and Engineering10.1504/IJCSE.2015.06883310:3(244-252)Online publication date: 1-Apr-2015
  • (2012)On the checkpointing strategy in desktop gridsProceedings of the 5th international conference on Internet and Distributed Computing Systems10.1007/978-3-642-34883-9_17(217-226)Online publication date: 21-Nov-2012
  • (2010)Estimating Error-probability and its Application for Optimizing Roll-back Recovery with CheckpointingProceedings of the 2010 Fifth IEEE International Symposium on Electronic Design, Test & Applications10.1109/DELTA.2010.25(281-285)Online publication date: 13-Jan-2010
  • (2010)Stochastic Models for CheckpointingStochastic Models for Fault Tolerance10.1007/978-3-642-11257-7_9(177-236)Online publication date: 19-Feb-2010
  • (2008)Optimal Placement of Application-Level Checkpoints2008 10th IEEE International Conference on High Performance Computing and Communications10.1109/HPCC.2008.40(853-858)Online publication date: Sep-2008
  • (2008)On the Integrity of Lightweight CheckpointsProceedings of the 2008 11th IEEE High Assurance Systems Engineering Symposium10.1109/HASE.2008.25(125-134)Online publication date: 3-Dec-2008
  • (2008)Module Prototype for Online Failure Prediction for the IBM Blue Gene/L2008 IEEE International Conference on Electro/Information Technology10.1109/EIT.2008.4554349(470-474)Online publication date: May-2008
  • (2007)CheckpointingFault-Tolerant Systems10.1016/B978-012088525-1/50009-2(193-228)Online publication date: 2007
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media