Recovery Point Selection on a Reverse Binary Tree Task Model

نویسندگان

  • Shyh-Kwei Chen
  • Wei-Tek Tsai
  • Bhavani M. Thuraisingham
چکیده

In this paper we analyze the complexity of placing recovery points where the computation is modeled as a reverse binary tree task model. The objective is to minimize the expected computation time of a program in the presence of faults. The method can be extended to an arbitrary reverse tree model. For uniprocessor systems, we propose an optimal placement algorithm. For multiprocessor systems, we describe a procedure to compute its performance. Since no closed form solution is available, we propose an alternative measurement which has a closed form formula. Based upon this formula, we devise algorithms to solve the recovery point placement problem. The estimated formula can be extended to include communication delays where the algorithm devised still applies.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comprehensive Decision Modeling of Reverse Logistics System: A Multi-criteria Decision Making Model by using Hybrid Evidential Reasoning Approach and TOPSIS (TECHNICAL NOTE)

In the last two decades, product recovery systems have received increasing attention due to several reasons such as new governmental regulations and economic advantages. One of the most important activities of these systems is to assign returned products to suitable reverse manufacturing alternatives. Uncertainty of returned products in terms of quantity, quality, and time complicates the decis...

متن کامل

Seismic Data Forecasting: A Sequence Prediction or a Sequence Recognition Task

In this paper, we have tried to predict earthquake events in a cluster of seismic data on pacific ring of fire, using multivariate adaptive regression splines (MARS). The model is employed as either a predictor for a sequence prediction task, or a binary classifier for a sequence recognition problem, which could alternatively help to predict an event. Here, we explain that sequence prediction/r...

متن کامل

Reverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages

Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...

متن کامل

Online learning of task-driven object-based visual attention control

We propose a biologically-motivated computational model for learning task-driven and object-based visual attention control in interactive environments. In this model, top-down attention is learned interactively and is used to search for a desired object in the scene through biasing the bottom-up attention in order to form a need-based and object-driven state representation of the environment. O...

متن کامل

Design of An Integrated Robust Optimization Model for Closed-Loop Supply Chain and supplier and remanufacturing subcontractor selection

The development of optimization and mathematical models for closed loop supply chain (CLSC) design has attracted considerable interest over the past decades. However, the uncertainties that are inherent in the network design are challenging the capabilities of the developed tools. In CLSC Uncertainty in demand is major source of uncertainty. The aim of this paper, therefore, is to present a Rob...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IEEE Trans. Software Eng.

دوره 15  شماره 

صفحات  -

تاریخ انتشار 1989