slugIssues and Challenges of Error Recovery Techniques for Mobile Distributed Systems
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 4
Abstract
The emergence of mobility in a distributed system, has led to the start of new era of computing. Recent technological advances in mobile or hand - held devices and wireless technology have made the mobile computing affordable. Due to new emerging characteristics of mobile node, mobile computing environment is more error prone as compared to fixed infrastructure. In this paper we present failure recovery techniques, is sues and challenges with respect to mobile distributed systems.
Authors and Affiliations
Monika Nagpal, Parveen Kumar, Surender Jangra
A Heuristic Approach to Factoid Question Generation from Sentence
Question Generation (QG) and Question Answering (QA) are among the many challenges in natural language generation and natural language understanding. An automated QG system focuses on generation of expressive and factoi...
Vapor−Liquid Equilibrium Data for the Binary System of Ethylene Glycol with Butanol At 94, 50, 10 KPA
Vapor−liquid equilibrium (VLE) data for Ethylene Glycol with Butanol are measured at pressure of 94, 50, 10 kPa by using a dynamic recirculation still. The experimental VLE data were tested to be thermodynamically consi...
Comparative Analysis of Different Methods of Tuning Load Frequency Control Problem
This paper studies control of load frequency in single area power systems with Ziegler-Nicholas PID controller. In this study, Ziegler-Nicholas PID controller is used to determine the parameters of the Ziegler-Nicholas...
Minimization of Casting Defects Using Casting Simulation Technique and Casting Defects Analysis Using Design of Experiment
In this paper Computer simulation technique and design of experiment used for casting defects analysis. In the first part using casting simulation technique analysis for shrinkage porosity defect is performed and new ga...
An Efficient Approach for Secure Hash Algorithm
Hash functions are the most widespread among all cryptographic primitives, and are currently used in multiple cryptographic schemes and in security protocols. A famous secure hash algorithm given by the National Institu...