Does Code Decay? Assessing the Evidence from Change Management Data
IEEE Transactions on Software Engineering
Towards Fault Recovery and Management inCommunication Networks
Journal of Network and Systems Management
Survivable ATM Group Communications Using Disjoint Meshes, Trees, and Rings
NGC '99 Proceedings of the First International COST264 Workshop on Networked Group Communication
Statistical non-parametric algorithms to estimate the optimal software rejuvenation schedule
PRDC '00 Proceedings of the 2000 Pacific Rim International Symposium on Dependable Computing
Modeling and Analysis of Software Aging and Rejuvenation
SS '00 Proceedings of the 33rd Annual Simulation Symposium
A Methodology for Detection and Estimation of Software Aging
ISSRE '98 Proceedings of the The Ninth International Symposium on Software Reliability Engineering
Software Rejuvenation: Analysis, Module and Applications
FTCS '95 Proceedings of the Twenty-Fifth International Symposium on Fault-Tolerant Computing
EDCC-4 Proceedings of the 4th European Dependable Computing Conference on Dependable Computing
ISAS '07 Proceedings of the 4th international symposium on Service Availability
On-line adaptive algorithms in autonomic restart control
ATC'10 Proceedings of the 7th international conference on Autonomic and trusted computing
Analysis of a service degradation model with preventive rejuvenation
ISAS'06 Proceedings of the Third international conference on Service Availability
Fault Resilient Real-Time Design for NoC Architectures
ICCPS '12 Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems
Hi-index | 0.00 |
The authors present two complementary ways to deal with soft-ware aging. Their approach pro-actively reinitializes software to a known operating state, before failure occurs, or reactively reconfigures soft-ware after a failure such that service remains operational.