نتایج جستجو برای: based logging systems

تعداد نتایج: 3741169  

2017
Xiangyao Yu Siye Zhu Justin Kaashoek Andrew Pavlo Srinivas Devadas

Logging is crucial to performance in modern multicore main-memory database management systems (DBMSs). Traditional data logging (ARIES) and command logging algorithms enforce a sequential order among log records using a global log sequence number (LSN). Log flushing and recovery after a crash are both performed in the LSN order. This serialization of transaction logging and recovery can limit t...

2007
Taesoon Park Heon Y. Yeom

This paper presents a novel logging scheme for recov-erable distributed shared memory systems. In the previous schemes, the stable logging is performed whenever a remote data value is accessed. However, in the proposed scheme, the data values are logged on the volatile storage of the writer process and only the access information between the dependent processes is logged stably. Also, to reduce...

1995
Yennun Huang

Much of the literature on message logging and checkpointing in the past decade has been based on a so-called optimistic approach 1] that places more emphasis on failure-free overhead than recovery ee-ciency. Our experience has shown that most telecommunications systems use a pessimistic approach because the main purpose of using message logging and checkpointing is to achieve fast and localized...

2000
Jim Helms Dennis C. Neale Philip L. Isenhour

Data logging has been a standard, but under utilized, software evaluation technique for single-user systems. Large volumes of objective data can be collected automatically and unobtrusively. This data, however, is usually in the form of low-level system events, making it difficult to analyze and interpret meaningfully. In this paper we extend traditional logging approaches to collaborative mult...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده مدیریت و حسابداری 1391

the application of e-learning systems - as one of the solutions to the issue of anywhere and anytime learning – is increasingly spreading in the area of education. content management - one of the most important parts of any e-learning system- is in the concern of tutors and teachers through which they can obtain means and paths to achieve the goals of the course and learning objectives. e-learn...

Journal: :IEICE Electronic Express 2013
Seung-Ho Lim

In NAND flash systems, the mapping table and related metadata information of FTL should be recovered from sudden power loss to provide data consistency. Nowadays, a lot of FTLs have been reported, however, there are little development reports for FTL recovery schemes. In this paper, we design fast metadata logging and recovery scheme to support efficient and fast power loss recovery. The design...

2008
Ch. D. V. Subba Rao M. M. Naidu

⎯ Checkpointing schemes facilitate fault recovery in distributed systems. The two-level fault recovery scheme of distributed system inherits the merits of both disk-based and diskless checkpointing schemes. The present work extends James S Plank’s Diskless checkpointing scheme (N+1 Parity) by introducing ‘Timeout’ to checkpoint programs with high locality of reference. This mechanism enables ap...

2017
Edson Tavares De Camargo Elias Procópio Duarte Fernando Pedone

High-performance computing (HPC) systems traditionally employ rollback-recovery techniques to allow faulttolerant executions of parallel applications. Rollback-recovery based on message logging is an attractive strategy that avoids the drawbacks of coordinated checkpointing in systems with low mean-time between failures (MTBF). Most message logging protocols rely on a centralized event logger t...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده فنی 1391

the study of air infiltration into the buildings is important from several perspectives that may be noted to energy and design of hvac systems, indoor air quality and thermal comfort and design of smoke control systems. given the importance of this issue, an experimental and numerical study of air infiltration through conventional doors and windows has been explored in iran. to this end, at fir...

1998
David Lomet Gerhard Weikum

Database systems recover persistent data, providing high database availability. However, database applications, typically residing on client or “middle-tier” application-server machines, may lose work because of a server failure. This prevents the masking of server failures from the human user and substantially degrades application availability. This paper aims to enable high application availa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید