11
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Minimum process communication induced checkpointing for mobile computing

, &

References

  • N. Wang, J. Wang, and X. Chen, “A trust-based formal model for fault detection in wireless sensor networks,” Sensors (Switzerland), vol. 19, no. 8, pp. 1–20, 2019.
  • S. Biswas and S. Neogy, “Secured fault tolerant mobile computing,” Commun. Comput. Inf. Sci., vol. 191 CCIS, no. PART 2, pp. 417–429, 2011.
  • C. Men, Z. Xu, and D. Wang, “An efficient Handoff strategy for mobile computing checkpoint system,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 4808 LNCS, pp. 410–421, 2007.
  • S. Biswas and S. Neogy, “A Mobility-Based CheckPointing Protocol for Mobile Computing System,” no. February, 2010.
  • S. Biswas, P. Dey, and S. Neogy, “Secure checkpointing-recovery using trusted nodes in MANET,” Proc. - 4th IEEE Int. Conf. Comput. Commun. Technol. ICCCT 2013, pp. 174–180, 2013.
  • M. Jamshidi, S. S. A. Poor, A. Arghavani, M. Esnaashari, A. A. Shaltooki, and M. R. Meybodi, “A simple, lightweight, and precise algorithm to defend against replica node attacks in mobile wireless networks using neighboring information,” Ad Hoc Networks, vol. 100, p. 102081, 2020. doi: https://doi.org/10.1016/j.adhoc.2020.102081
  • “Minimum Process Coordinated Checkpointing Scheme for Ad Hoc,” vol. 1, no. 2, pp. 51–63, 2011.
  • H. Mansouri, N. Badache, M. Aliouat, and A. S. K. Pathan, “Checkpointing distributed application running on mobile ad hoc networks,” Int. J. High Perform. Comput. Netw., vol. 11, no. 2, pp. 95–107, 2018. doi: https://doi.org/10.1504/IJHPCN.2018.089888
  • G. Cao and M. Singhal, “On coordinated checkpointing in distributed systems,” IEEE Trans. Parallel Distrib. Syst., vol. 9, no. 12, pp. 1213–1225, 1998. doi: https://doi.org/10.1109/71.737697
  • I. C. Garcia, G. M. D. Vieira, and L. E. Buzato, “A Rollback in the History of Communication-Induced Checkpointing,” pp. 1–30.
  • Z. Abdelhafidi, N. Lagraa, M. B. Yagoubi, and M. Djoudi, “Low overhead communication-induced checkpointing protocols ensuring rollback-dependency trackability property Distributed execution,” no. June, pp. 1–18, 2017.
  • A. Guermouche, “Uncoordinated Checkpointing Without Domino Effect for Send-Deterministic MPI Applications,” pp. 989–1000, 2011.
  • S. Biswas, S. Neogy, and P. Dey, “M Obility B Ased C Heckpointing and T Rust,” vol. 4, no. 4, pp. 53–69, 2012.
  • Z. Rosberg, R. P. Liu, T. Le Dinh, Y. F. Dong, and S. Jha, “Statistical reliability for energy efficient data transport in wireless sensor networks,” Wirel. Networks, vol. 16, no. 7, pp. 1913–1927, 2010. doi: https://doi.org/10.1007/s11276-009-0235-5
  • P Kumar and R Garg, Soft-Checkpointing Based Coordinated Checkpointing Protocol for Mobile Distributed Systems, International Journal of Computer Science Issues, Vol. 7, Issue 3, No 5, May 2010.
  • P Kumar and R Garg, Soft-Checkpointing Based Hybrid Synchronous Checkpointing Protocol for Mobile Distributed Systems, IGI Global, DOI: https://doi.org/10.4018/978-1-61350-101-6.ch318, Wireless Technologies: Concepts, Methodologies, Tools and Applications, 2011.
  • R Garg and P Kumar, A Nonblocking Coordinated Checkpointing Algorithm for Mobile Computing Systems, International Journal of Computer Science Issues, Vol. 7, Issue 3, No 3, May 2010.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.