Second-Level Algorithms, Superrecursivity, and Recovery Problem in Distributed Systems

被引:0
|
作者
Mark Burgin
Bidyut Gupta
机构
[1] University of California,Department of Computer Science
[2] Los Angeles,Department of Computer Science
[3] Southern Illinois University,undefined
来源
关键词
Distributed systems; Network recovery; Recovery algorithm; Check-point algorithm; Super-recursive algorithm; Second level algorithm;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we analyze network recovery algorithms, which allow computer networks to properly function in spite of failures. In this analysis, we use methods and tools of the theory of super-recursive algorithms. The concept of algorithm of the second level is introduced and studied. It is demonstrated that although the main components of various check-point/recovery algorithms are recursive algorithms, check-point/recovery algorithms, as a whole, are super-recursive second-level algorithms. Treating network recovery algorithms as second level algorithms is oriented at developing more powerful algorithms by combining existing ones in a common schema.
引用
收藏
页码:694 / 705
页数:11
相关论文
共 50 条
  • [1] Second-Level Algorithms, Superrecursivity, and Recovery Problem in Distributed Systems
    Burgin, Mark
    Gupta, Bidyut
    [J]. THEORY OF COMPUTING SYSTEMS, 2012, 50 (04) : 694 - 705
  • [2] The "Circonstants" in a Second-Level Predication in Russian
    Bracquenier, Christine
    [J]. STUDIA UNIVERSITATIS BABES-BOLYAI PHILOLOGIA, 2011, 56 (02): : 143 - 156
  • [3] Design of Hybrid Second-Level Caches
    Valero, Alejandro
    Sahuquillo, Julio
    Petit, Salvador
    Lopez, Pedro
    Duato, Jose
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (07) : 1884 - 1897
  • [4] Second-Level Partition for Estimating FAR Confidence Intervals in Biometric Systems
    Li, Rongfeng
    Tang, Darun
    Li, Wenxin
    Zhang, David
    [J]. COMPUTER ANALYSIS OF IMAGES AND PATTERNS, PROCEEDINGS, 2009, 5702 : 58 - +
  • [5] THE CONCEPT AND PRACTICE OF SECOND-LEVEL SCREENING
    TESKA, JA
    STONEBURNER, RL
    [J]. PSYCHOLOGY IN THE SCHOOLS, 1980, 17 (02) : 192 - 195
  • [6] Multi-product maximal covering second-level facility location problem
    Baldomero-Naranjo, Marta
    Martinez-Merino, LuisaI.
    Rodriguez-Chia, AntonioM.
    [J]. COMPUTERS & INDUSTRIAL ENGINEERING, 2024, 189
  • [7] Verifying second-level security protocols
    Bella, G
    Longo, C
    Paulson, LC
    [J]. THEOREM PROVING IN HIGHER ORDER LOGICS, PROCEEDINGS, 2003, 2758 : 352 - 366
  • [8] Latin translation for second-level students
    Marneffe, I
    [J]. LATOMUS, 2001, 60 (02) : 552 - 552
  • [9] Second-level buffer cache management
    Zhou, YY
    Chen, ZF
    Li, K
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2004, 15 (06) : 505 - 519
  • [10] EFFICIENT ALGORITHMS FOR CRASH RECOVERY IN DISTRIBUTED SYSTEMS
    JUANG, TTY
    VENKATESAN, S
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 472 : 349 - 361