Computer Science ›› 2009, Vol. 36 ›› Issue (4): 192-194.
Previous Articles Next Articles
Online:
Published:
Abstract: As a popular software fault-tolerant mechanism, checkpoint and recovery technique can be implemented by two modes:user-level and system-level. First, the differences between the two modes were discussed. Then according to the Linux LKM (Loadable Kernel Mo
Key words: Checkpoint and recovery,User level,System level,Kernel module,Kernel thread
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2009/V36/I4/192
Cited