Minimizing completion time of a program by checkpointing and rejuvenation
Proceedings of the 1996 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
The Automatic Generation of Load Test Suites and the Assessment of the Resulting Software
IEEE Transactions on Software Engineering
Software Rejuvenation: Analysis, Module and Applications
FTCS '95 Proceedings of the Twenty-Fifth International Symposium on Fault-Tolerant Computing
Theory, Volume 1, Queueing Systems
Theory, Volume 1, Queueing Systems
Performance testing of software systems
Proceedings of the 1st international workshop on Software and performance
Architectural modeling in industry—an experience report
Proceedings of the 20th international conference on Software engineering
Empirical research in software engineering: a workshop
ACM SIGSOFT Software Engineering Notes
Experience with Performance Testing of Software Systems: Issues, an Approach, and Case Study
IEEE Transactions on Software Engineering
Analysis and implementation of software rejuvenation in cluster systems
Proceedings of the 2001 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Software Reliability and Rejuvenation: Modeling and Analysis
Performance Evaluation of Complex Systems: Techniques and Tools, Performance 2002, Tutorial Lectures
A Comprehensive Model for Software Rejuvenation
IEEE Transactions on Dependable and Secure Computing
Ensuring stable performance for systems that degrade
Proceedings of the 5th international workshop on Software and performance
Performability analysis of clustered systems with rejuvenation under varying workload
Performance Evaluation
Ensuring system performance for cluster and single server systems
Journal of Systems and Software
ISAS '07 Proceedings of the 4th international symposium on Service Availability
Simulation-Based Optimization Approach for Software Cost Model with Rejuvenation
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
High-available grid services through the use of virtualized clustering
GRID '07 Proceedings of the 8th IEEE/ACM International Conference on Grid Computing
Estimating Periodic Software Rejuvenation Schedules under Discrete-Time Operation Circumstance
IEICE - Transactions on Information and Systems
Proactive management of software aging
IBM Journal of Research and Development
Discrete-time cost analysis for a telecommunication billing application with rejuvenation
Computers & Mathematics with Applications
Monitoring for security intrusion using performance signatures
Proceedings of the first joint WOSP/SIPEW international conference on Performance engineering
Managing performance of aging applications via synchronized replica rejuvenation
DSOM'07 Proceedings of the Distributed systems: operations and management 18th IFIP/IEEE international conference on Managing virtualization of networks and services
Analysis of a software system with rejuvenation, restoration and checkpointing
ISAS'08 Proceedings of the 5th international conference on Service availability
Semi-Markov performance modelling of a redundant system with partial, full and failed rejuvenation
International Journal of Critical Computer-Based Systems
Methods and opportunities for rejuvenation in aging distributed software systems
Journal of Systems and Software
Journal of Systems and Software
Monitoring the health condition of a ubiquitous system: rejuvenation vs. recovery
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A proactive approach towards always-on availability in broadband cable networks
Computer Communications
A survey of software aging and rejuvenation studies
ACM Journal on Emerging Technologies in Computing Systems (JETC) - Special Issue on Reliability and Device Degradation in Emerging Technologies and Special Issue on WoSAR 2011
Hi-index | 0.00 |
A strategy is presented for determining when it is advantageousto take some action to restore a system to full capacity. A determinationis made of the types of data that need to be collected and circumstancesunder which the strategy is likely to be useful. Production trafficdata is presented for a very large industrial telecommunicationsproject, and the strategy is applied. An investigation is madeof when the application of the strategy leads to increased systemavailability and decreased packet loss experienced by users.