Computer Science ›› 2009, Vol. 36 ›› Issue (4): 192-194.

Previous Articles     Next Articles

  

  • Online:2018-11-16 Published:2018-11-16

Abstract: As a popular software fault-tolerant mechanism, checkpoint and recovery technique can be implemented by two modes:user-level and system-level. First, the differences between the two modes were discussed. Then according to the Linux LKM (Loadable Kernel Mo

Key words: Checkpoint and recovery,User level,System level,Kernel module,Kernel thread

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!