1997
DOI: 10.1109/12.641939
|View full text |Cite
|
Sign up to set email alerts
|

Performance optimization of checkpointing schemes with task duplication

Abstract: Abstract-In checkpointing schemes with task duplication, checkpointing serves two purposes: detecting faults by comparing the processors' states at checkpoints, and reducing fault recovery time by supplying a safe point to rollback to. In this paper, we show that, by tuning the checkpointing schemes to a given architecture, a significant reduction in the execution time can be achieved. The main idea is to use two types of checkpoints: compare-checkpoints (comparing the states of the redundant processes to dete… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0
1

Year Published

1998
1998
2014
2014

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 50 publications
(25 citation statements)
references
References 14 publications
0
24
0
1
Order By: Relevance
“…A short description of the schemes is given here. A more detailed description and the analysis of those schemes can be found in [19]. The simplest scheme is the TMR-F scheme [11].…”
Section: Scheme Comparisonmentioning
confidence: 99%
See 3 more Smart Citations
“…A short description of the schemes is given here. A more detailed description and the analysis of those schemes can be found in [19]. The simplest scheme is the TMR-F scheme [11].…”
Section: Scheme Comparisonmentioning
confidence: 99%
“…Using the analysis technique described in Section 2, we calculated the average execution time of the four schemes considered in this section for a task of length one with n checkpoints [19]: Fig . 3 shows the average execution time of a task using each of the four schemes, with overhead time of t oh = 0.002 for each step.…”
Section: Simplified Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…A checkpoint is placed at time t, t 0 £ t < t 1 The analysis of the modified algorithm is essentially the same as the analysis of the original on-line algorithm that was shown in Lemma 2. The details of the analysis of the modified algorithm can be found in [13]. .…”
Section: The Modified Algorithmmentioning
confidence: 99%