期刊文献+

可逆排序算法的分析与实现

Analysis and Implementation of Reversible Sorting Algorithm
下载PDF
导出
摘要 使软件系统基于当前状态恢复先前某一状态的方法通常有两种:检查点和反向计算。为比较这两种方法的实现代价,以如何实现最低代价的可逆排序为例,将增量检查点技术应用于简单选择排序算法,实现了一种通过增量保存程序运行时系统状态的变化信息以恢复系统先前某一状态的排序算法,并通过反向计算技术实现了一种无需系统状态历史信息仅通过系统当前状态和程序自身逻辑便恢复先前状态的可逆排序算法。通过大量测试用例验证了上述两类算法的正确性,并得出在大规模且数据交换频繁的场景下反向计算排序算法远优于检查点排序算法的结论。 Generally there are two ways for recovery of system current state to a certain previous state, they are checkpointing and reverse computation. In order to compare implementation costs of the two ways, take how to implement reversible sorting algorithm with minimal costs for example, we implemented the simple selection sorting algorithm with incremental checkpointing which recovered system state with incrementally saved state information. Then, we implemented a reversible sorting algorithm via reverse computation which can recover system state with current state and its program logic. Finally, we verified the validity of these algorithms via a large number of test cases, and concluded that sorting algorithm based on reverse computation is much better than the one using checkpointing under the environment of large-scale data and with lots of data exchanges.
出处 《计算机仿真》 CSCD 北大核心 2015年第3期304-309,共6页 Computer Simulation
基金 国家自然科学基金(60873069) 江苏省高校自然科学研究项目(14KJB520033) 南通市应用研究计划(BK2013043)
关键词 可逆排序算法 检查点 反向计算 最低代价 Reversible Sorting Algorithm Checkpointing Reverse Computation Minimal cost
  • 相关文献

参考文献13

  • 1A Gainaru, F Cappello, W Kramer. Taming of the shrew: Model- ing the normal and faulty behavior of large- scale HPC systems [ C ]. Proceedings of the IEEE 26th international conference on IP- DPS. Shanghai, 2012:1168-1179.
  • 2耿技,陈非,聂鹏,陈伟,秦志光.可靠的分布式系统生存性保障模型[J].计算机应用,2012,32(10):2748-2751. 被引量:2
  • 3I Goiri, et al, Checkpoint-based fauh-tolerant infrastructure for virtualized service providers [ C ]. Proceedings of the IEEE Network Operations and Management Symp. Osaka, JP, 2010:455-462.
  • 4R Landauer. Irreversibility and heat generation in the computing process[ J ]. IBM Journal of Research and Development, 1961,5 (3) :183-191.
  • 5T Yokoyama, R. A GI II Ik reversible programming language and its invertible self-interpreter[ C]. Proceedings of the Partial Evalu- ation and Program Manipulation, New York, USA, 2007 : 144 - 153.
  • 6T Yokoyama. Reversible computation and reversible programming languages[ J]. Electronic Notes in Theoretical Computer Science, 2010,253(6) :71-81.
  • 7M PFrank. Reversibility for efficient computing [ D ]. Cambridge Massachusetts: MIT, 1999.
  • 8G Vulov, et al. The backstroke framework for source level reverse computation applied to parallel discrete event simulation[ C]. Pro- ceedings of the 2011 Winter on Simulation Conference (WSC), Phoenix, AZ, 2011:2960-2974.
  • 9Thomas H Cormen, et al. Introduction to Algorithms(3nd ed) [ M]. Massachusetts: MIT Press, 2009.
  • 10Chen Chih-Ho, Ting Yung, Heh Jia-Sheng. Low overhead in- cremental checkpointing and rollback recovery scheme on Win- dows operating system[ C]. Proceedings of 3rd International Con- ference on Knowledge Discovery and Data Mining, Phuket, 2010: 268-271.

二级参考文献15

  • 1GUPTA B, RAHIMI S, YANG Y. A novel roll-back mechanism for performance enhancement of asynchronous checkpointing and recov- ery[ J]. Infonnatiea, 2007, 3(11) : 1 - 13.
  • 2ELNOZAHY E N, ALVISI L, WANG Y M, et al. A survey of roll- back-recovery protocols in message-passing systems[ J]. ACM Com- puting Surveys, 2002, 34(3): 375 "408.
  • 3WANG Y M, CHUNG P Y, LIN I J, et al. Checkpoint space recla- mation for uncoordinated checkpointing in message-passing systems [ J]. IEEE Transactions on Parallel and Distributed Systems, 1995, 6(5): 546 -554.
  • 4RUSCIO J F, HEFFNER M A, VARADARJAN S. DejaVu: Trans- parent user-level checkpointing, migration, and recovery for distrib- uted systems [ C]// SC'06: Proceedings of the 2006 ACM/IEEE Conference on Supercomputing. New York: ACM, 2006: 158.
  • 5MALONEY A, GOSCINSKI A. A survey and review of the current state of rollback-recovery for cluster systems[ J]. Concurrency and Computation: Practice and Experience, 2009, 21 (12) : 1632 - 1666.
  • 6TRIPATHY M, TRIPATHY C R. A new coordinated checkpointing and rollback recovery scheme for distributed shared memory clusters [ J]. International Journal of Distributed and Parallel Systems, 2011, 2(1): 49 -58.
  • 7PRIYA S B, RAVICHANDRAN T. Fault tolerance and recovery for grid application reliability using check pointing mechanism[ J]. Intematianal Journal of Computer Applications,2011, 26(5): 32 -37.
  • 8BOUTEILLER A, HERAULT T, BOSILCA G, et al. Correlated set coordination in fault tolerant message logging protocols[ C]// Euro- Par'l 1: Proceedings of the 17th International Conference on Parallel Processing. Berlin: Springer-Verlag, 2011:51-64.
  • 9CI-/ANDY K M, LAMPORT L. Distributed snapshots: Determining global states of distributed systems[ J]. ACM Transactions on Com- puter Systems, 1985, 3(1) : 63 -75.
  • 10ELNOZAHY E N, JOHNSON D B, ZWAENEPOEL W. The per- formance of consistent checkpointing[ C]// Proceedings of the 11 th Symposium on Reliable Distributed Systems. [ S. 1. ] : IEEE, 1992: 39 - 47.

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部