<--- Back to Details
First PageDocument Content
Transaction processing / Computing / Fault-tolerant computer systems / Data management / Application checkpointing / Data / Rollback / Database transaction / Checkpoint / Communication protocol / Two-phase commit protocol
Date: 2002-05-07 12:54:50
Transaction processing
Computing
Fault-tolerant computer systems
Data management
Application checkpointing
Data
Rollback
Database transaction
Checkpoint
Communication protocol
Two-phase commit protocol

A Survey of Rollback-Recovery Protocols in Message-Passing Systems E.N. (MOOTAZ) ELNOZAHY IBM Research LORENZO ALVISI The University of Texas at Austin

Add to Reading List

Source URL: www.cs.utexas.edu

Download Document from Source Website

File Size: 528,42 KB

Share Document on Facebook

Similar Documents

DIGGING FOR GROUNDHOGS: HOLES IN YOUR LINUX SERVER CHECK POINT THREAT INTELLIGENCE AND RESEARCH LEAD RESEARCHERS: STANISLAV SKURATOVICH, ALIAKSANDR TRAFIMCHUK

DIGGING FOR GROUNDHOGS: HOLES IN YOUR LINUX SERVER CHECK POINT THREAT INTELLIGENCE AND RESEARCH LEAD RESEARCHERS: STANISLAV SKURATOVICH, ALIAKSANDR TRAFIMCHUK

DocID: 1xVB7 - View Document

PDF Document

DocID: 1xdy3 - View Document

PDF Document

DocID: 1vU5O - View Document

Endpoint Security Threat Forensics |  Datasheet CHECK POINT THREAT FORENSICS

Endpoint Security Threat Forensics | Datasheet CHECK POINT THREAT FORENSICS

DocID: 1voNO - View Document

Shape Up, Man!  Marty McFly Present the hazard & password to this (or Dastardly’s) puzzle at checkpoint 1 for its remaining puzzles.

Shape Up, Man! Marty McFly Present the hazard & password to this (or Dastardly’s) puzzle at checkpoint 1 for its remaining puzzles.

DocID: 1vkVf - View Document