نتایج جستجو برای: based logging systems
تعداد نتایج: 3741169 فیلتر نتایج به سال:
Supervisory control and data acquisition systems (SCADA) are widely used in industry for supervisory control and data acquisition of industrial processes. The process can be industrial, infrastructure or facility. With the advances of electronic and software technologies, the SCADA systems are widely used in industrial plant automation. It provides an efficient tool to monitor and control equip...
Logging is a central service in computing systems. It lays the foundation for accountability and audit services in computing systems, as well as for other accessory services. While providing logging services in traditional computing systems is a relatively smooth process, it turns to an intricate task in pervasive computing systems. In this context, we present two contributions addressing this ...
Evaluation of digital libraries assesses their effectiveness, quality and overall impact. To facilitate the comparison of different evaluations and to support the re-use of evaluation data, we are proposing a new logging schema. This schema will allow for logging and sharing of a wide array of data about users, systems and their interactions. We discuss the multi-level logging framework present...
Based on our current expectation for the exascale systems, composed of hundred of thousands of many-core nodes, the mean time between failures will become small, even under the most optimistic assumptions. One of the most scalable checkpoint restart techniques, the message logging approach, is the most challenged when the number of cores per node increases, due to the high overhead of saving th...
abstract the problems caused by the traditional system of criminal justice (which are based on remuneration and rehabilitation) such as, lack of attention to victim’s rights and position and society, underlie the emergence of restorative justice which had the victim-centered perspective, with respect to the role of the offender and participation of civil society. meanwhile, criminal mediation ...
An Asynchronous Recovery Scheme based on Optimistic Message Logging for the Mobile Computing Systems
To provide the fault-tolerance for the mobile computing systems, many checkpointing-based recovery schemes have been proposed. However, considering the nature of the mobile environment in which some mobile hosts (MHs) are often disconnected from the network and the probability of concurrent failures on MHs is high, any kind of coordination during the checkpointing and even during the recovery m...
The previous communication-induced checkpointing may considerably induce worthless forced checkpoints because each process receiving messages cannot obtain sufficient information related to non-causal Z-paths. This paper presents an enhanced sender-based message logging protocol applicable any lead a high decrease of the overhead in effective way while permitting no useless checkpoint. allows s...
When attempting to apply sender-based message logging with checkpointing into large-scale and geographically distributed systems, two important things should be reconsidered: reducing the number of messages passing on core networks during its fully message logging and recovery procedures and purging effectively logged messages from their senders' volatile memories. This paper presents a novel m...
We present a peer logging system for reducing performance overhead in fault-tolerant distributed shared memory systems. Our system provides fault-tolerant shared memory using individual checkpointing and rollback. Peer logging logs DSM modification messages to remote nodes instead of to local disks. We present results for implementations of our fault-tolerant technique using simulations of both...
Over the last few years, there have been several efforts to use logging to improve performance, reliability, and recovery times of file systems. The two major techniques are metadata logging, where the log records metadata changes and is a supplement to the on-disk file system, and log-structured file systems, whose log is their only on-disk representation. When the file system is mainly or who...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید