{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T03:11:06Z","timestamp":1769310666016,"version":"3.49.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,3,21]],"date-time":"2013-03-21T00:00:00Z","timestamp":1363824000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1007\/s11227-013-0898-7","type":"journal-article","created":{"date-parts":[[2013,3,20]],"date-time":"2013-03-20T14:58:28Z","timestamp":1363791508000},"page":"193-228","source":"Crossref","is-referenced-by-count":53,"title":["Analyzing, modeling and evaluating dynamic adaptive fault tolerance strategies in cloud computing environments"],"prefix":"10.1007","volume":"66","author":[{"given":"Dawei","family":"Sun","sequence":"first","affiliation":[]},{"given":"Guiran","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Changsheng","family":"Miao","sequence":"additional","affiliation":[]},{"given":"Xingwei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,3,21]]},"reference":[{"issue":"1","key":"898_CR1","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.dss.2010.12.006","volume":"51","author":"S Marston","year":"2011","unstructured":"Marston S, Li Z, Bandyopadhyay S, Zhang J, Ghalsasi A (2011) Cloud computing\u2014the business perspective. Decis Support Syst 51(1):176\u2013189","journal-title":"Decis Support Syst"},{"issue":"6","key":"898_CR2","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1016\/j.future.2008.12.001","volume":"25","author":"R Buyya","year":"2009","unstructured":"Buyya R, Chee Shin Y, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comput Syst 25(6):599\u2013616","journal-title":"Future Gener Comput Syst"},{"issue":"4","key":"898_CR3","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53(4):50\u201358","journal-title":"Commun ACM"},{"issue":"6","key":"898_CR4","first-page":"50","volume":"53","author":"P Mell","year":"2010","unstructured":"Mell P, Grance T (2010) The NIST definition of cloud computing. Commun ACM 53(6):50","journal-title":"Commun ACM"},{"issue":"6","key":"898_CR5","doi-asserted-by":"crossref","first-page":"931","DOI":"10.1109\/TPDS.2011.66","volume":"22","author":"A Iosup","year":"2011","unstructured":"Iosup A, Ostermann S, Yigitbasi MN, Prodan R, Fahringer T, Epema DHJ (2011) Performance analysis of cloud computing services for many-tasks scientific computing. IEEE Trans Parallel Distrib Syst 22(6):931\u2013945","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"7","key":"898_CR6","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1016\/j.advengsoft.2011.03.007","volume":"42","author":"BM Xu","year":"2011","unstructured":"Xu BM, Zhao CY, Hu EZ, Hu B (2011) Job scheduling algorithm based on Berger model in cloud environment. Adv Eng Softw 42(7):419\u2013425","journal-title":"Adv Eng Softw"},{"issue":"1","key":"898_CR7","first-page":"51","volume":"18","author":"Q Zhu","year":"2010","unstructured":"Zhu Q, Agrawal G (2010) Supporting fault-tolerance for time-critical events in distributed environments. Sci Program 18(1):51\u201376","journal-title":"Sci Program"},{"key":"898_CR8","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1109\/CLOUD.2011.16","volume-title":"Proc 2011 IEEE 4th international conference on cloud computing (CLOUD\u00a02011)","author":"Y Zhang","year":"2011","unstructured":"Zhang Y, Zheng Z, Lyu MR (2011) BFTCloud: a byzantine fault tolerance framework for voluntary-resource cloud computing. In: Proc 2011 IEEE 4th international conference on cloud computing (CLOUD\u00a02011), Jul. 2011. IEEE Press, New York, pp 444\u2013451"},{"key":"898_CR9","doi-asserted-by":"crossref","first-page":"1525","DOI":"10.1109\/IPDPS.2011.306","volume-title":"Proc 2011 IEEE international symposium on parallel & distributed processing, workshops and Phd forum","author":"E Okorafor","year":"2011","unstructured":"Okorafor E (2011) A fault-tolerant high performance cloud strategy for scientific computing. In: Proc 2011 IEEE international symposium on parallel & distributed processing, workshops and Phd forum, May 2011. IEEE Press, New York, pp 1525\u20131532"},{"key":"898_CR10","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1109\/ISSRE.2010.28","volume-title":"Proc 2010 IEEE 21st international symposium on software reliability engineering (ISSRE 2010)","author":"Z Zheng","year":"2010","unstructured":"Zheng Z, Zhou TC, Lyu MR, King I (2010) FTCloud: a component ranking framework for fault-tolerant cloud applications. In: Proc 2010 IEEE 21st international symposium on software reliability engineering (ISSRE 2010), Nov. 2010. IEEE Press, New York, pp 398\u2013407"},{"issue":"5","key":"898_CR11","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1109\/TC.2010.129","volume":"60","author":"Y Li","year":"2011","unstructured":"Li Y, Lan Z (2011) FREM: a fast restart mechanism for general checkpoint\/restart. IEEE Trans Comput 60(5):639\u2013652","journal-title":"IEEE Trans Comput"},{"issue":"11","key":"898_CR12","first-page":"45","volume":"42","author":"J Brogan","year":"2010","unstructured":"Brogan J (2010) Expand your pareto principle 80\u201320 metrics can evaluate viability of numerous endeavors. Ind Eng 42(11):45\u201349","journal-title":"Ind Eng"},{"issue":"5","key":"898_CR13","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1016\/j.peva.2011.01.005","volume":"68","author":"Y Luo","year":"2011","unstructured":"Luo Y, Manivannan D (2011) Theoretical and experimental evaluation of communication-induced checkpointing protocols in FE and FLazy-E families. Perform Eval 68(5):429\u2013445","journal-title":"Perform Eval"},{"issue":"5","key":"898_CR14","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/1165389.945450","volume":"37","author":"S Ghemawat","year":"2003","unstructured":"Ghemawat S, Gobioff H, Leung ST (2003) The Google file system. Oper Syst Rev 37(5):29\u201343","journal-title":"Oper Syst Rev"},{"key":"898_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/MSST.2010.5496972","volume-title":"Proc 2010 IEEE 26th symposium on mass storage systems and technologies (MSST 2010)","author":"K Shvachko","year":"2010","unstructured":"Shvachko K, Kuang H, Radia S, Chansler R (2010) The Hadoop distributed file system. In: Proc 2010 IEEE 26th symposium on mass storage systems and technologies (MSST 2010), May 2010. IEEE Press, New York, pp 1\u201310"},{"issue":"1","key":"898_CR16","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1007\/s11227-009-0345-y","volume":"56","author":"K Qureshi","year":"2011","unstructured":"Qureshi K, Khan FG, Manuel P, Nazir B (2011) A hybrid fault tolerance technique in grid computing system. J Supercomput 56(1):106\u2013128","journal-title":"J Supercomput"},{"issue":"2","key":"898_CR17","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1109\/TPDS.2008.93","volume":"20","author":"M Chtepen","year":"2009","unstructured":"Chtepen M, Claeys FHA, Dhoedt B, De Turck F, Demeester P, Vanrolleghem PA (2009) Adaptive task checkpointing and replication: toward efficient fault-tolerant grids. IEEE Trans Parallel Distrib Syst 20(2):180\u2013190","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"898_CR18","doi-asserted-by":"crossref","first-page":"524","DOI":"10.1109\/ICPADS.2010.48","volume-title":"Proc 16th international conference on parallel and distributed systems (ICPADS 2010)","author":"C Wang","year":"2010","unstructured":"Wang C, Mueller F, Engelmann C, Scott SL (2010) Hybrid checkpointing for MPI jobs in HPC environments. In: Proc 16th international conference on parallel and distributed systems (ICPADS 2010), Dec. 2010. IEEE Press, New York, pp 524\u2013533"},{"issue":"1","key":"898_CR19","doi-asserted-by":"crossref","first-page":"906","DOI":"10.1016\/j.eswa.2010.07.072","volume":"38","author":"SS Wang","year":"2011","unstructured":"Wang SS, Yan KQ, Wang SC (2011) Achieving efficient agreement within a dual-failure cloud-computing environment. Expert Syst Appl 38(1):906\u2013915","journal-title":"Expert Syst Appl"},{"key":"898_CR20","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1109\/WKDD.2010.135","volume-title":"Proc 2010 3rd international conference on knowledge discovery and data mining (WKDD 2010)","author":"CH Chen","year":"2010","unstructured":"Chen CH, Ting Y, Heh JS (2010) Low overhead incremental checkpointing and rollback recovery scheme on Windows operating system. In: Proc 2010 3rd international conference on knowledge discovery and data mining (WKDD 2010), Jan. 2010. IEEE Press, New York, pp 268\u2013271"},{"issue":"4","key":"898_CR21","doi-asserted-by":"crossref","first-page":"386","DOI":"10.15837\/ijccc.2009.4.2455","volume":"4","author":"N Naksinehaboon","year":"2009","unstructured":"Naksinehaboon N, Paun M, Nassar R, Leangsuksun B, Scott S (2009) High performance computing systems with various checkpointing schemes. Int J Comput Commun Control 4(4):386\u2013400","journal-title":"Int J Comput Commun Control"},{"issue":"3","key":"898_CR22","first-page":"951","volume":"26","author":"M Lotfi","year":"2010","unstructured":"Lotfi M, Motamedi SA (2010) Adaptive two-level blocking coordinated checkpointing for high performance cluster computing systems. J Inf Sci Eng 26(3):951\u2013966","journal-title":"J Inf Sci Eng"},{"issue":"5","key":"898_CR23","doi-asserted-by":"crossref","first-page":"620","DOI":"10.1109\/TPDS.2009.108","volume":"21","author":"R Garg","year":"2010","unstructured":"Garg R, Garg VK, Sabharwal Y (2010) Efficient algorithms for global snapshots in large distributed systems. IEEE Trans Parallel Distrib Syst 21(5):620\u2013630","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"898_CR24","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1109\/SRDS.2010.17","volume-title":"Proc 2010 29th IEEE international symposium on reliable distributed systems (SRDS 2010)","author":"RM Menderico","year":"2010","unstructured":"Menderico RM, Garcia IC (2010) Diskless checkpointing with rollback-dependency trackability. In: Proc 2010 29th IEEE international symposium on reliable distributed systems (SRDS 2010), Nov. 2010. IEEE Press, New York, pp 275\u2013281"},{"issue":"4","key":"898_CR25","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1109\/TDSC.2010.76","volume":"8","author":"GM Chiu","year":"2011","unstructured":"Chiu GM, Chiu JF (2011) A new diskless checkpointing approach for multiple processor failures. IEEE Trans Dependable Secure Comput 8(4):481\u2013493","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"7","key":"898_CR26","doi-asserted-by":"crossref","first-page":"699","DOI":"10.1109\/12.936236","volume":"50","author":"Y Ling","year":"2001","unstructured":"Ling Y, Mi J, Lin X (2001) A variational calculus approach to optimal checkpoint placement. IEEE Trans Comput 50(7):699\u2013708","journal-title":"IEEE Trans Comput"},{"issue":"2","key":"898_CR27","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.future.2007.04.009","volume":"24","author":"M Lei","year":"2008","unstructured":"Lei M, Vrbsky SV, Hong X (2008) An on-line replication strategy to increase availability in data grids. Future Gener Comput Syst 24(2):85\u201398","journal-title":"Future Gener Comput Syst"},{"issue":"3","key":"898_CR28","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/s11227-008-0172-6","volume":"45","author":"RS Chang","year":"2008","unstructured":"Chang RS, Chang HP (2008) A dynamic data replication strategy using access-weights in data grids. J Supercomput 45(3):277\u2013295","journal-title":"J Supercomput"},{"issue":"8","key":"898_CR29","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1016\/j.future.2010.02.004","volume":"26","author":"D Yuan","year":"2010","unstructured":"Yuan D, Yang Y, Liu X, Chen J (2010) A data placement strategy in scientific cloud workflows. Future Gener Comput Syst 26(8):1200\u20131214","journal-title":"Future Gener Comput Syst"},{"issue":"1","key":"898_CR30","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/s10844-007-0049-9","volume":"32","author":"I Ray","year":"2009","unstructured":"Ray I, Ray I, Chakraborty S (2009) An interoperable context sensitive model of trust. J Intell Inf Syst 32(1):75\u2013104","journal-title":"J Intell Inf Syst"},{"issue":"1","key":"898_CR31","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/TDSC.2008.19","volume":"7","author":"M Tu","year":"2010","unstructured":"Tu M, Li P, Yen IL, Thuraisingham BM, Khan L (2010) Secure data objects replication in data grid. IEEE Trans Dependable Secure Comput 7(1):50\u201364","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"21","key":"898_CR32","doi-asserted-by":"crossref","first-page":"3772","DOI":"10.1016\/j.ins.2009.07.003","volume":"179","author":"JY Wang","year":"2009","unstructured":"Wang JY, Jea KF (2009) A near-optimal database allocation for reducing the average waiting time in the grid computing environment. Inf Sci 179(21):3772\u20133790","journal-title":"Inf Sci"},{"key":"898_CR33","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/978-3-642-13067-0_9","volume-title":"Proc the 5th international conference advances in grid and pervasive computing (GPC 2010)","author":"D Jung","year":"2010","unstructured":"Jung D, Chin SH, Chung KS, Suh T, Yu HC, Gil JM (2010) An effective job replication technique based on reliability and performance in mobile grids. In: Proc the 5th international conference advances in grid and pervasive computing (GPC 2010), May 2010. Springer, Berlin, pp 47\u201358"},{"key":"898_CR34","doi-asserted-by":"crossref","first-page":"1147","DOI":"10.1587\/transinf.E93.D.1147","volume":"93-D","author":"YH Kim","year":"2010","unstructured":"Kim YH, Jung MJ, Lee CH (2010) Energy-aware real-time task scheduling exploiting temporal locality. IEICE Trans Inf Syst 93-D:1147\u20131153","journal-title":"IEICE Trans Inf Syst"},{"issue":"12","key":"898_CR35","doi-asserted-by":"crossref","first-page":"1986","DOI":"10.1109\/TPDS.2011.86","volume":"22","author":"H Liu","year":"2011","unstructured":"Liu H, Jin H, Liao X, Yu C, Xu CZ (2011) Live virtual machine migration via asynchronous replication and state synchronization. IEEE Trans Parallel Distrib Syst 22(12):1986\u20131999","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"6","key":"898_CR36","doi-asserted-by":"crossref","first-page":"1110","DOI":"10.1016\/j.compeleceng.2010.04.004","volume":"36","author":"FG Khan","year":"2010","unstructured":"Khan FG, Qureshi K, Nazir B (2010) Performance evaluation of fault tolerance techniques in grid computing system. Comput Electr Eng 36(6):1110\u20131122","journal-title":"Comput Electr Eng"},{"issue":"11","key":"898_CR37","doi-asserted-by":"crossref","first-page":"1196","DOI":"10.1002\/cpe.1696","volume":"23","author":"S Marzouk","year":"2011","unstructured":"Marzouk S, Jmaiel M (2011) A survey on software checkpointing and mobility techniques in distributed systems. Concurr Comput 23(11):1196\u20131212","journal-title":"Concurr Comput"},{"issue":"1","key":"898_CR38","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1109\/TR.2011.2104997","volume":"60","author":"Z Ma","year":"2011","unstructured":"Ma Z, Krings AW (2011) Dynamic hybrid fault modeling and extended evolutionary game theory for reliability, survivability and fault tolerance analyses. IEEE Trans Reliab 60(1):180\u2013196","journal-title":"IEEE Trans Reliab"},{"issue":"2","key":"898_CR39","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1016\/j.future.2009.07.015","volume":"26","author":"X Shi","year":"2010","unstructured":"Shi X, Pazat JL, Rodriguez E, Jin H, Jiang H (2010) Adapting grid applications to safety using fault-tolerant methods: design, implementation and evaluations. Future Gener Comput Syst 26(2):236\u2013244","journal-title":"Future Gener Comput Syst"},{"issue":"4","key":"898_CR40","doi-asserted-by":"crossref","first-page":"554","DOI":"10.1016\/j.future.2009.10.008","volume":"26","author":"FY Leu","year":"2010","unstructured":"Leu FY, Yang CT, Jiang FC (2010) Improving reliability of a heterogeneous grid-based intrusion detection platform using levels of redundancies. Future Gener Comput Syst 26(4):554\u2013568","journal-title":"Future Gener Comput Syst"},{"key":"898_CR41","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/HPCSIM.2009.5192685","volume-title":"2009 international conference on high performance computing & simulation (HPCS)","author":"R Buyya","year":"2009","unstructured":"Buyya R, Ranjan R, Calheiros RN (2009) Modeling and simulation of scalable cloud computing environments and the CloudSim toolkit: challenges and opportunities. In: 2009 international conference on high performance computing & simulation (HPCS), June 2009, pp 1\u201311"},{"key":"898_CR42","first-page":"189","volume-title":"Proc. the first international conference information computing and applications (ICICA\u00a02010)","author":"G Belalem","year":"2010","unstructured":"Belalem G, Tayeb FZ, Zaoui W (2010) Approaches to improve the resources management in the simulator CloudSim. In: Proc. the first international conference information computing and applications (ICICA\u00a02010), (Oct.\u00a02010). Springer, Berlin, pp 189\u2013196"},{"issue":"1","key":"898_CR43","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1002\/spe.995","volume":"41","author":"RN Calheiros","year":"2011","unstructured":"Calheiros RN, Ranjan R, Beloglazov A, De Rose CAF, Buyya R (2011) CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Softw Pract Exp 41(1):23\u201350","journal-title":"Softw Pract Exp"},{"issue":"7","key":"898_CR44","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1016\/j.advengsoft.2011.03.007","volume":"42","author":"BM Xu","year":"2011","unstructured":"Xu BM, Zhao CY, Hu EZ, Hu B (2011) Job scheduling algorithm based on Berger model in cloud environment. Adv Eng Softw 42(7):419\u2013425","journal-title":"Adv Eng Softw"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-013-0898-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-013-0898-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-013-0898-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,11]],"date-time":"2019-07-11T04:55:38Z","timestamp":1562820938000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-013-0898-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3,21]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,10]]}},"alternative-id":["898"],"URL":"https:\/\/doi.org\/10.1007\/s11227-013-0898-7","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,3,21]]}}}