Comparative analysis of different models of checkpointing and recovery

Abstract
No abstract available