期刊文献+

缺陷硬盘数据恢复新技术中的影子方法 被引量:1

Shadow Technique in the New Technology for Disfigurement Hard Disk Data Resumption
下载PDF
导出
摘要 论述了缺陷硬盘数据恢复的最新技术——影子方法.介绍了影子技术的实现方案.同传统的磁盘镜像技术相比,该技术不是单纯地创建磁盘镜像,而是通过一定的算法组织影子盘的数据,只有成功读取过的数据才会在影子盘上建立相应的影子,以后读取缺陷盘时会优先从影子盘上读取,减少了缺陷盘的读取次数,从而对缺陷盘起到了很好的保护作用. This paper discusses the latest technology of disfigurement hard disk resumption: shadow technique, which is different from traditional disk suite technique, and introduces the implementing scheme of shadow technique. Not only does the shadow technique create disk suite, but also organizes shadow disk data with some algorithms. Only if the data is read successfully will shadow be created. When reading disfigurement disk, shadow disk will be read firstly so the number of reading disfigurement disk will be reduced. So disfigurement disk is protected commendably.
出处 《重庆工学院学报(自然科学版)》 2009年第6期40-44,共5页 Journal of Chongqing Institute of Technology
基金 重庆市自然科学基金资助项目(CSTC 2007BA2023)
  • 相关文献

参考文献5

  • 1Song Eun-Mi. No-log recovery mechanism using stable memory for real-time main memory database systems [ C ]//Proc of the 6th Int. 1 Conf on Real-Time Computing Sys-tems and Applications, Hongkong: [ s. n. ] , 1999:428 - 431.
  • 2Woo S K, Kin M H, Lee Y J. An efective recovery under fuzzy checkp, ointing in main memory database [ J ]. Inform - ion and Software Technolog, 2000,42 : 185 - 196.
  • 3廖国琼,刘云生,肖迎元.实时内存数据库分区模糊检验点策略[J].计算机研究与发展,2006,43(7):1291-1296. 被引量:6
  • 4M i-Seon Choi, Hye-Sook Yoon. Two-step backup mechanism for real-time main memory database recovery [ C ]// Real-Time Computing Systems an d Applications Proceedings Seventh Intern ational Conference. South Korea : [s. n. ] ,2000:453 -457.
  • 5Inseon Lee,Heon Y, Yeom, et al. A new approach for distributed main memory database systems:Causal corarait protocol[ C]//IEICE Tran sactions on Information an d Systems. [ S. l. ] : [ s. n. ] ,2004:196 - 204.

二级参考文献7

  • 1H. V. Jagadish, A. Silberschatz, S. Sudarshan. Recovering from main memory lapses [C]. The 19th Conf. Very Large Databases,Dublin, Ireland, 1993. 391-404
  • 2S. K. Woo, M. H. Kim, Y. J. Lee. An effective recovery under fuzzy checkpointing in main memory databases[J].Information and Software Technology, 2000, (42) : 185-196
  • 3Dongho Lee, Haengrae Cho. Checkpointing schemes for fast restart in main memory database systems [C]. In: IEEE Pacific Rim Conf. Communications, Computers and Signal Processing,vol.2. Piscataway, NJ: IEEE Press, 1997. 663-668
  • 4Jing Huang, Le Gruenwald. Crash recovery for real-time main memory database systems [C]. In: Proc. ACM Symposium on Applied Computing. New York: ACM Press, 1996. 145-149
  • 5Jing Huang, Le Gruenwald. An update-frequency-valid-interval partition checkpoint technique for real-time main memory databases [C]. The Workshop on Real Time Databases, Newport Beach, CA, 1996. 130-137
  • 6廖国琼.嵌入式实时数据库恢复处理研究:[博士后研究报告][D].武汉:华中科技大学,2005.
  • 7Liao Guoqiong, Liu Yunsheng, Xiao Yingyuan. CPU scheduling in an embedded active real-time database system [C]. The 11th ISPE Int'l Conf. Concurrent Engineering, Beijing, 2004

共引文献5

同被引文献8

  • 1Plank J S. The RAID-6 l.iberation Codes [C] // Proceedings of FAST '08:6th USENIX Conference on File and Storage Technologies. USENIX Association, 2008 : 97-111.
  • 2Chao Jin, Hong Jiang, et al. P Code:A New RAID-6 Code with Optimal Properties [C] // Proceeding of ICS' 09 : International Conference of Supereomputing. York Town Heights, New York, USA, 2009.
  • 3Blaum M, Roth R M. On 1.owest Density MDS Codes [J]. IEEE Transactions on Information Theory, 1999 : 45 ( 1 ) : 46-59.
  • 4Blomer J, Kalfane M, et aI. An XOR based Erasure ResilientCoding Scheme [R]. TR 95 048. International Computer Scien ce Institute,August 1995.
  • 5Blaum M, Bruck J, Vardy A. MDS Array Codes with Indepen dent Parity Symbols [J]. IEEE Trans. Inform. Theory, 1996,42 (2) :529-542.
  • 6Feng Gui liang, Deng R H, et al. New Efficient MDS Array Codes for RAID Part h Reed Solomon Like Codes for Tolerating Three Disk Failures [J]. IEEE Trans. on Computers, 2005,54 (9):1071-1080.
  • 7Cheng Huang, Xu Li-hao. STAR:An Efficient Coding Scheme for Correcting Triple Storage Node Failures [J]. IEEE Trans. on Computers,2008,57(7) :889 901.
  • 8万武南,索望,张金全,陈运.基于EEOD码的一种有效的数据分布策略[J].电子科技大学学报,2007,36(5):834-837. 被引量:2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部