![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Network survivability modeling and analysis for power-aware MANETs by Markov regenerative processes
This paper presents the quantitative network survivability analysis for a power-aware mobile ad hoc network (MANET) based on Markov regenerative processes (MRGPs). The MRGP is one of the widest classes of stoc...
-
Article
Guest editorial
-
Article
Foreword
-
Article
Application of deterministic annealing EM algorithm to MAP/PH parameter estimation
This paper proposes a variant of EM (expectation-maximization) algorithm for Markovian arrival process (MAP) and phase-type distribution (PH) parameter estimation. Especially, we derive the deterministic annea...
-
Chapter and Conference Paper
Comparing Checkpoint and Rollback Recovery Schemes in a Cluster System
Cluster systems play a central role to realize high performance computing with relatively low cost, and at the same time are necessary the fault-tolerance features for the practical use. In this paper we devel...
-
Chapter and Conference Paper
Bayesian Inference for Credible Intervals of Optimal Software Release Time
This paper deals with the estimation of a credible interval of the optimal software release time in the context of Bayesian inference. In the past literature, the optimal software release time was often discus...
-
Chapter and Conference Paper
Estimating Software Reliability Using Extreme Value Distribution
In this paper, we propose a novel modeling approach for the non-homogeneous Poisson process (NHPP) based software reliability models (SRMs) to describe the stochastic behavior of software fault-detection proce...
-
Chapter and Conference Paper
Environmental Diversity Techniques of Software Systems
Several recent studies have reported that most outages in technical computerbased systems are due to software faults. Traditional methods in software engineering are fault avoidance/removal based on extensive ...
-
Chapter and Conference Paper
Comparison of Aperiodic Checkpoint Placement Algorithms
In this article we summarize some aperiodic checkpoint placement algorithms for a software system over a finite operation-time horizon, and compare them in terms of computational accuracy. The underlying probl...
-
Chapter and Conference Paper
Markov Chain Monte Carlo Random Testing
This paper proposes a software random testing scheme based on Markov chain Monte Carlo (MCMC) method. The significant issue of software testing is how to use the prior knowledge of experienced testers and the ...
-
Chapter and Conference Paper
Availability Analysis of an IMS-Based VoIP Network System
In multimedia wireless networks, VoIP (voice over internet protocol) technology is commonly used to compress the voice information based on a various type of coding techniques, transform it to the packet data,...
-
Chapter and Conference Paper
On-Line Adaptive Algorithms in Autonomic Restart Control
Restarts or retries are typical control schemes to meet a deadline in real-time systems, and are regarded as significant environmental diversity techniques in dependable computing. This paper reconsiders a res...
-
Chapter and Conference Paper
Towards Autonomic Mode Control of a Scalable Intrusion Tolerant Architecture
In this article we consider an intrusion tolerant system with two detection modes; automatic detection mode and manual detection mode for intrusions, and describe the dynamic transition behavior by a continuou...
-
Chapter and Conference Paper
A Bayesian Inference Tool for NHPP-Based Software Reliability Assessment
In this paper, we concern a sampling method for Markov chain Monte Carlo (MCMC) in estimating software reliability, and propose a unified MCMC algorithm based on the Metropolis-Hasting method regardless of mod...
-
Chapter and Conference Paper
Availability Analysis of a Scalable Intrusion Tolerant Architecture with Two Detection Modes
In this paper we consider a discrete-time availability model of an intrusion tolerant system with two detection modes; automatic detection mode and manual detection mode. The stochastic behavior of the system ...
-
Chapter and Conference Paper
Simulation-Based Optimization Approach for Software Cost Model with Rejuvenation
Software rejuvenation is a preventive and proactive maintenance solution that is particularly useful for counteracting the phenomenon of software aging. In this paper we consider an operational software system...
-
Chapter and Conference Paper
Analysis of a Software System with Rejuvenation, Restoration and Checkpointing
In this paper we consider operational software system with two failure modes and develop a stochastic model to quantify steady-state system availability. Three kinds of preventive/corrective maintenance polici...
-
Chapter and Conference Paper
Optimizing Security Measures in an Intrusion Tolerant Database System
In this paper we describe the stochastic behavior of an intrusion tolerant database (ITDB) system and quantitatively evaluate its security measures. More specifically, we develop a semi-Markov model and derive...
-
Chapter and Conference Paper
Quantitative Evaluation of Intrusion Tolerant Systems Subject to DoS Attacks Via Semi-Markov Cost Models
In this paper we quantitatively evaluate the security of intrusion tolerant systems with preventive maintenance subject to DoS (Denial of Service) attacks. More specifically, we develop two semi-Markov cost mo...
-
Chapter and Conference Paper
Performance Evaluation for Automatic Protection Switching in a CDMA-TDD Wireless Communication System
The CDMA (Code Division Multiple Access) is classified into two mainstream technologies; CDMA2000 and CDMA-TDD (Code Division Multiple Access with Time Division Duplex mode). Specifically, in China, the CDMA-T...