Minimizing completion time of a program by checkpointing and rejuvenation
Proceedings of the 1996 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Fine grained software degradation models for optimal rejuvenation policies
Performance Evaluation
Monitoring Smoothly Degrading Systems for Increased Dependability
Empirical Software Engineering
Statistical non-parametric algorithms to estimate the optimal software rejuvenation schedule
PRDC '00 Proceedings of the 2000 Pacific Rim International Symposium on Dependable Computing
Modeling and Analysis of Software Aging and Rejuvenation
SS '00 Proceedings of the 33rd Annual Simulation Symposium
Software Rejuvenation: Analysis, Module and Applications
FTCS '95 Proceedings of the Twenty-Fifth International Symposium on Fault-Tolerant Computing
Ensuring stable performance for systems that degrade
Proceedings of the 5th international workshop on Software and performance
Using performance signatures and software rejuvenation for worm mitigation in tactical MANETs
WOSP '07 Proceedings of the 6th international workshop on Software and performance
Ensuring system performance for cluster and single server systems
Journal of Systems and Software
Measuring client-perceived response times on the WWW
USITS'01 Proceedings of the 3rd conference on USENIX Symposium on Internet Technologies and Systems - Volume 3
A Nonlinear Approach to Modeling of Software Aging in a Web Server
APSEC '08 Proceedings of the 2008 15th Asia-Pacific Software Engineering Conference
Proactive management of software aging
IBM Journal of Research and Development
Hi-index | 0.00 |
In this paper we describe several methods for detecting the need for software rejuvenation in mission critical systems that are subjected to worm infection, and introduce new software rejuvenation algorithms. We evaluate these algorithms' effectiveness using both simulation studies and analytic modeling, by assessing the probability of mission success. The system under study emulates a Mobile Ad-Hoc Network (MANET) of processing nodes. Our analysis determined that some of our rejuvenation algorithms are quite effective in maintaining a high probability of mission success while the system is under explicit attack by a worm infection.