21.01.2014 Views

Xiao Liu PhD Thesis.pdf - Faculty of Information and Communication ...

Xiao Liu PhD Thesis.pdf - Faculty of Information and Communication ...

Xiao Liu PhD Thesis.pdf - Faculty of Information and Communication ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

skipped if self-recovery applies. As shown in Table 7.1, our temporal violation<br />

h<strong>and</strong>ling point selection strategy is to apply the adaptive modification process for<br />

probability threshold to the h<strong>and</strong>ling point selection rule.<br />

The input parameters for the strategy include the necessary <strong>and</strong> sufficient<br />

checkpoint, the probability time deficit, the probability time redundancy <strong>and</strong> the<br />

probability threshold. Since h<strong>and</strong>ling point selection is based on the results <strong>of</strong> the<br />

state-<strong>of</strong>-the-art checkpoint selection strategy, i.e. the minimum time redundancy<br />

based checkpoint selection strategy where the time overhead is negligible, the<br />

computation <strong>of</strong> the probability time redundancy according to Definition 7.2 can be<br />

included in the checkpoint selection process [56]. Therefore, since PT is a variant,<br />

the only extra cost for computing the input parameters is for the probability time<br />

deficit according to Definition 7.1. After the input parameters are specified, the<br />

current probability <strong>of</strong> self-recovery is obtained according to Definition 7.3 <strong>and</strong><br />

compared with the adaptively updated probability threshold to further decide<br />

whether the current checkpoint needs to be selected as a temporal violation h<strong>and</strong>ling<br />

point or not. The time overhead for our temporal violation h<strong>and</strong>ling point selection<br />

strategy can be viewed negligible since it only requires several steps <strong>of</strong> simple<br />

calculation. In the next section, we will evaluate the performance <strong>of</strong> our strategy<br />

comprehensively.<br />

7.3 Evaluation<br />

In the existing work, temporal violation h<strong>and</strong>ling point selection is regarded the<br />

same as checkpoint selection, hence the existing state-<strong>of</strong>-the-art checkpoint selection<br />

strategy (with the minimum number <strong>of</strong> selected checkpoints)<br />

CSS TD [22] is<br />

implemented as the benchmark for comparison with ours. The detailed description<br />

for<br />

CSS TD <strong>and</strong> its performance better than the other 8 representative strategies are<br />

omitted in this chapter which can be found in [22]. In addition, to evaluate the<br />

effectiveness <strong>of</strong> our adaptive strategy, a pure r<strong>and</strong>om h<strong>and</strong>ling point selection<br />

strategy denoted as RA is also implemented. RA selects h<strong>and</strong>ling points at every<br />

necessary <strong>and</strong> sufficient checkpoint in a pure r<strong>and</strong>om fashion. The selection rule <strong>of</strong><br />

RA is as follows: at a necessary <strong>and</strong> sufficient checkpoint<br />

a p<br />

, a r<strong>and</strong>om value<br />

111

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!