![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Prediction Interval of Cumulative Number of Software Faults Using Multilayer Perceptron
Software reliability is one of the most important attributes in software quality metrics. To predict the number of software faults detected in testing phase, many approaches have been applied during the last f...
-
Chapter and Conference Paper
mapfit: An R-Based Tool for PH/MAP Parameter Estimation
In this paper, we present a tool for estimating parameters of phase-type distribution (PH) and Markovian arrival process (MAP) on the statistical analysis package R. PH and MAP are useful for the analysis of n...
-
Chapter and Conference Paper
Comparing Checkpoint and Rollback Recovery Schemes in a Cluster System
Cluster systems play a central role to realize high performance computing with relatively low cost, and at the same time are necessary the fault-tolerance features for the practical use. In this paper we devel...
-
Chapter and Conference Paper
Bayesian Inference for Credible Intervals of Optimal Software Release Time
This paper deals with the estimation of a credible interval of the optimal software release time in the context of Bayesian inference. In the past literature, the optimal software release time was often discus...
-
Chapter and Conference Paper
Estimating Software Reliability Using Extreme Value Distribution
In this paper, we propose a novel modeling approach for the non-homogeneous Poisson process (NHPP) based software reliability models (SRMs) to describe the stochastic behavior of software fault-detection proce...
-
Chapter and Conference Paper
Environmental Diversity Techniques of Software Systems
Several recent studies have reported that most outages in technical computerbased systems are due to software faults. Traditional methods in software engineering are fault avoidance/removal based on extensive ...
-
Chapter and Conference Paper
Comparison of Aperiodic Checkpoint Placement Algorithms
In this article we summarize some aperiodic checkpoint placement algorithms for a software system over a finite operation-time horizon, and compare them in terms of computational accuracy. The underlying probl...
-
Chapter and Conference Paper
Markov Chain Monte Carlo Random Testing
This paper proposes a software random testing scheme based on Markov chain Monte Carlo (MCMC) method. The significant issue of software testing is how to use the prior knowledge of experienced testers and the ...
-
Chapter and Conference Paper
Availability Analysis of an IMS-Based VoIP Network System
In multimedia wireless networks, VoIP (voice over internet protocol) technology is commonly used to compress the voice information based on a various type of coding techniques, transform it to the packet data,...
-
Chapter and Conference Paper
On-Line Adaptive Algorithms in Autonomic Restart Control
Restarts or retries are typical control schemes to meet a deadline in real-time systems, and are regarded as significant environmental diversity techniques in dependable computing. This paper reconsiders a res...
-
Chapter and Conference Paper
Towards Autonomic Mode Control of a Scalable Intrusion Tolerant Architecture
In this article we consider an intrusion tolerant system with two detection modes; automatic detection mode and manual detection mode for intrusions, and describe the dynamic transition behavior by a continuou...
-
Chapter and Conference Paper
An Experimental Evaluation of Error Rate in a Web Server System
In this paper we focus on the relationship between the error rate which is one of the representative reliability measures in Apache web servers and the system parameters which reflect on the web server’s syste...
-
Chapter and Conference Paper
An EM Algorithm for Record Value Statistics Models in Software Reliability Estimation
This paper proposes an EM (expectation-maximization) algorithm for record value statistics (RVS) models in software reliability estimation. The RVS model provides one of the generalized modeling frameworks to ...
-
Chapter and Conference Paper
A Bayesian Inference Tool for NHPP-Based Software Reliability Assessment
In this paper, we concern a sampling method for Markov chain Monte Carlo (MCMC) in estimating software reliability, and propose a unified MCMC algorithm based on the Metropolis-Hasting method regardless of mod...
-
Chapter and Conference Paper
Availability Analysis of a Scalable Intrusion Tolerant Architecture with Two Detection Modes
In this paper we consider a discrete-time availability model of an intrusion tolerant system with two detection modes; automatic detection mode and manual detection mode. The stochastic behavior of the system ...
-
Chapter and Conference Paper
A Refined Non-parametric Algorithm for Sequential Software Reliability Estimation
In this article, we improve a non-parametric order statistics-based software reliability model by Barghout, Littlewood and Abdel-Ghaly (1998), from the standpoints of estimation algorithm and reliability measu...
-
Chapter and Conference Paper
Simulation-Based Optimization Approach for Software Cost Model with Rejuvenation
Software rejuvenation is a preventive and proactive maintenance solution that is particularly useful for counteracting the phenomenon of software aging. In this paper we consider an operational software system...
-
Chapter and Conference Paper
Analysis of a Software System with Rejuvenation, Restoration and Checkpointing
In this paper we consider operational software system with two failure modes and develop a stochastic model to quantify steady-state system availability. Three kinds of preventive/corrective maintenance polici...
-
Chapter and Conference Paper
Optimizing Security Measures in an Intrusion Tolerant Database System
In this paper we describe the stochastic behavior of an intrusion tolerant database (ITDB) system and quantitatively evaluate its security measures. More specifically, we develop a semi-Markov model and derive...
-
Chapter and Conference Paper
Quantitative Evaluation of Intrusion Tolerant Systems Subject to DoS Attacks Via Semi-Markov Cost Models
In this paper we quantitatively evaluate the security of intrusion tolerant systems with preventive maintenance subject to DoS (Denial of Service) attacks. More specifically, we develop two semi-Markov cost mo...