Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    Network survivability modeling and analysis for power-aware MANETs by Markov regenerative processes

    This paper presents the quantitative network survivability analysis for a power-aware mobile ad hoc network (MANET) based on Markov regenerative processes (MRGPs). The MRGP is one of the widest classes of stoc...

    Hiroyuki Okamura, Zhipeng Yi, Tadashi Dohi in Telecommunication Systems (2015)

  2. Article

    Guest editorial

    Laurence T. Yang, Bernady O. Apduhan, Tadashi Dohi, Manish Parashar in Computing (2014)

  3. No Access

    Article

    Foreword

    Tadashi Dohi, Kuan-Ching Li, Yufeng Wang in Telecommunication Systems (2013)

  4. No Access

    Article

    Application of deterministic annealing EM algorithm to MAP/PH parameter estimation

    This paper proposes a variant of EM (expectation-maximization) algorithm for Markovian arrival process (MAP) and phase-type distribution (PH) parameter estimation. Especially, we derive the deterministic annea...

    Hiroyuki Okamura, Hidenari Kishikawa, Tadashi Dohi in Telecommunication Systems (2013)

  5. No Access

    Chapter and Conference Paper

    Comparing Checkpoint and Rollback Recovery Schemes in a Cluster System

    Cluster systems play a central role to realize high performance computing with relatively low cost, and at the same time are necessary the fault-tolerance features for the practical use. In this paper we devel...

    Noriaki Bessho, Tadashi Dohi in Algorithms and Architectures for Parallel Processing (2012)

  6. No Access

    Chapter and Conference Paper

    Bayesian Inference for Credible Intervals of Optimal Software Release Time

    This paper deals with the estimation of a credible interval of the optimal software release time in the context of Bayesian inference. In the past literature, the optimal software release time was often discus...

    Hiroyuki Okamura, Tadashi Dohi, Shunji Osaki in Software Engineering, Business Continuity,… (2011)

  7. No Access

    Chapter and Conference Paper

    Estimating Software Reliability Using Extreme Value Distribution

    In this paper, we propose a novel modeling approach for the non-homogeneous Poisson process (NHPP) based software reliability models (SRMs) to describe the stochastic behavior of software fault-detection proce...

    **ao **ao, Tadashi Dohi in Software Engineering, Business Continuity, and Education (2011)

  8. No Access

    Chapter and Conference Paper

    Environmental Diversity Techniques of Software Systems

    Several recent studies have reported that most outages in technical computerbased systems are due to software faults. Traditional methods in software engineering are fault avoidance/removal based on extensive ...

    Tadashi Dohi in Future Generation Information Technology (2011)

  9. No Access

    Chapter and Conference Paper

    Comparison of Aperiodic Checkpoint Placement Algorithms

    In this article we summarize some aperiodic checkpoint placement algorithms for a software system over a finite operation-time horizon, and compare them in terms of computational accuracy. The underlying probl...

    Shunsuke Hiroyama, Tadashi Dohi in Advanced Computer Science and Information … (2010)

  10. No Access

    Chapter and Conference Paper

    Markov Chain Monte Carlo Random Testing

    This paper proposes a software random testing scheme based on Markov chain Monte Carlo (MCMC) method. The significant issue of software testing is how to use the prior knowledge of experienced testers and the ...

    Bo Zhou, Hiroyuki Okamura, Tadashi Dohi in Advances in Computer Science and Informati… (2010)

  11. No Access

    Chapter and Conference Paper

    Availability Analysis of an IMS-Based VoIP Network System

    In multimedia wireless networks, VoIP (voice over internet protocol) technology is commonly used to compress the voice information based on a various type of coding techniques, transform it to the packet data,...

    Toshikazu Uemura, Tadashi Dohi, Naoto Kaio in Computational Science and Its Applications… (2010)

  12. No Access

    Chapter and Conference Paper

    On-Line Adaptive Algorithms in Autonomic Restart Control

    Restarts or retries are typical control schemes to meet a deadline in real-time systems, and are regarded as significant environmental diversity techniques in dependable computing. This paper reconsiders a res...

    Hiroyuki Okamura, Tadashi Dohi, Kishor S. Trivedi in Autonomic and Trusted Computing (2010)

  13. No Access

    Chapter and Conference Paper

    Towards Autonomic Mode Control of a Scalable Intrusion Tolerant Architecture

    In this article we consider an intrusion tolerant system with two detection modes; automatic detection mode and manual detection mode for intrusions, and describe the dynamic transition behavior by a continuou...

    Tadashi Dohi, Toshikazu Uemura in Autonomic and Trusted Computing (2010)

  14. No Access

    Chapter and Conference Paper

    A Bayesian Inference Tool for NHPP-Based Software Reliability Assessment

    In this paper, we concern a sampling method for Markov chain Monte Carlo (MCMC) in estimating software reliability, and propose a unified MCMC algorithm based on the Metropolis-Hasting method regardless of mod...

    Takumi Hirata, Hiroyuki Okamura, Tadashi Dohi in Future Generation Information Technology (2009)

  15. No Access

    Chapter and Conference Paper

    Availability Analysis of a Scalable Intrusion Tolerant Architecture with Two Detection Modes

    In this paper we consider a discrete-time availability model of an intrusion tolerant system with two detection modes; automatic detection mode and manual detection mode. The stochastic behavior of the system ...

    Toshikazu Uemura, Tadashi Dohi, Naoto Kaio in Cloud Computing (2009)

  16. No Access

    Chapter and Conference Paper

    Simulation-Based Optimization Approach for Software Cost Model with Rejuvenation

    Software rejuvenation is a preventive and proactive maintenance solution that is particularly useful for counteracting the phenomenon of software aging. In this paper we consider an operational software system...

    Hiroyuki Eto, Tadashi Dohi, Jianhua Ma in Autonomic and Trusted Computing (2008)

  17. No Access

    Chapter and Conference Paper

    Analysis of a Software System with Rejuvenation, Restoration and Checkpointing

    In this paper we consider operational software system with two failure modes and develop a stochastic model to quantify steady-state system availability. Three kinds of preventive/corrective maintenance polici...

    Hiroyuki Okamura, Tadashi Dohi in Service Availability (2008)

  18. No Access

    Chapter and Conference Paper

    Optimizing Security Measures in an Intrusion Tolerant Database System

    In this paper we describe the stochastic behavior of an intrusion tolerant database (ITDB) system and quantitatively evaluate its security measures. More specifically, we develop a semi-Markov model and derive...

    Toshikazu Uemura, Tadashi Dohi in Service Availability (2008)

  19. Chapter and Conference Paper

    Quantitative Evaluation of Intrusion Tolerant Systems Subject to DoS Attacks Via Semi-Markov Cost Models

    In this paper we quantitatively evaluate the security of intrusion tolerant systems with preventive maintenance subject to DoS (Denial of Service) attacks. More specifically, we develop two semi-Markov cost mo...

    Toshikazu Uemura, Tadashi Dohi in Emerging Directions in Embedded and Ubiquitous Computing (2007)

  20. No Access

    Chapter and Conference Paper

    Performance Evaluation for Automatic Protection Switching in a CDMA-TDD Wireless Communication System

    The CDMA (Code Division Multiple Access) is classified into two mainstream technologies; CDMA2000 and CDMA-TDD (Code Division Multiple Access with Time Division Duplex mode). Specifically, in China, the CDMA-T...

    Li Zhang, Hiroyuki Okamura, Tadashi Dohi in Human-Computer Interaction. HCI Applicatio… (2007)

previous disabled Page of 2