Tight Upper Bound on Useful Distributed System Checkpoints
نویسندگان
چکیده
In this paper, we give an alternative proof of the necessary and sufficient condition for achieving optimal checkpoint garbage collection in distributed systems [9]. We show that, by formulating the recovery line calculation problem as a reachability analysis problem on a rollback-dependency graph, the proof can be greatly simplified. We also present a polynomial-time optimal garbage collection algorithm based on a graph search.
منابع مشابه
Sharp Upper bounds for Multiplicative Version of Degree Distance and Multiplicative Version of Gutman Index of Some Products of Graphs
In $1994,$ degree distance of a graph was introduced by Dobrynin, Kochetova and Gutman. And Gutman proposed the Gutman index of a graph in $1994.$ In this paper, we introduce the concepts of multiplicative version of degree distance and the multiplicative version of Gutman index of a graph. We find the sharp upper bound for the multiplicative version of degree distance and multiplicative ver...
متن کاملAn Efficient Evaluation for the Reliability Upper Bound of Distributed Systems with Unreliable Nodes and Edges
The distributed systems in which nodes and/or edges may fail with certain probabilities have been modelled by a probabilistic network or a graph G. Computing the residual connectedness reliability (RCR), denoted by R(G), of probabilistic networks under the fault model with both node and edge faults is very useful, but is an NP-hard problem. Since it may need exponential time of the network size...
متن کاملA Tight Upper Bound of the Lumped Disk Seek Time for the Scan Disk Scheduling Policy
A tight upper bound of the lumped disk seek time for the Scan disk scheduling policy is presented. The tight upper bound is based on an accurate disk seek time model. One of the most important applications of the tight upper bound is in multimedia storage system design. Without a tight upper bound based on an accurate disk seek time model, the designers of multimedia storage systems would be fo...
متن کاملThe Computational Power of Beeps
In this paper, we study the quantity of computational resources (state machine states and/or probabilistic transition precision) needed to solve specific problems in a single hop network where nodes communicate using only beeps. We begin by focusing on randomized leader election. We prove a lower bound on the states required to solve this problem with a given error bound, probability precision,...
متن کاملA Tight Bound on Time Complexity of Mutual Exclusion
In distributed shared memory multiprocessors, remote memory accesses generate processor-tomemory traffic which may result in a bottleneck. It is therefore important to design algorithms that minimize the number of remote memory accesses. We establish a lower bound of 3 on remote access time complexity for mutual exclusion algorithms in a model where processes communicate by means of a general r...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1995