-
1
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
A. Avižienis, J.-C. Laprie, B. Randell, and C. Landwehr. "Basic concepts and taxonomy of dependable and secure computing," IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 1, pp. 11-33, 2004.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avižienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.4
-
2
-
-
27844593365
-
A workload-based analysis of software aging and rejuvenation
-
Y. Bao, X. Sun, and K. S. Trivedi. "A workload-based analysis of software aging and rejuvenation," IEEE Transactions on Reliability, vol. 55, no. 3, pp. 541-548, 2005.
-
(2005)
IEEE Transactions on Reliability
, vol.55
, Issue.3
, pp. 541-548
-
-
Bao, Y.1
Sun, X.2
Trivedi, K.S.3
-
3
-
-
76549130086
-
-
Cisco Systems, Inc. Cisco security advisory: Cisco Catalyst memory leak vulnerability, Document ID: 13618, 2001. URL = http://www.cisco.com/ warp/public/707/cisco-sa-20001206-catalyst-memleak.shtml.
-
Cisco Systems, Inc. "Cisco security advisory: Cisco Catalyst memory leak vulnerability," Document ID: 13618, 2001. URL = http://www.cisco.com/ warp/public/707/cisco-sa-20001206-catalyst-memleak.shtml.
-
-
-
-
4
-
-
33845570005
-
Software faults, software aging, and software rejuvenation
-
M. Grottke and K. S. Trivedi. "Software faults, software aging, and software rejuvenation," Journal of the Reliability Association of Japan, vol. 27, no. 7, pp. 425-438, 2005.
-
(2005)
Journal of the Reliability Association of Japan
, vol.27
, Issue.7
, pp. 425-438
-
-
Grottke, M.1
Trivedi, K.S.2
-
5
-
-
34047266625
-
Analysis of software aging in a web server
-
M. Grottke, L. Li, K. Vaidyanathan, and K. S. Trivedi. "Analysis of software aging in a web server," IEEE Transactions on Reliability, vol. 55, no. 3, pp. 411-420, 2006.
-
(2006)
IEEE Transactions on Reliability
, vol.55
, Issue.3
, pp. 411-420
-
-
Grottke, M.1
Li, L.2
Vaidyanathan, K.3
Trivedi, K.S.4
-
6
-
-
33947495454
-
Fighting bugs: Remove, retry, replicate and rejuvenate
-
M. Grottke and K. S. Trivedi. "Fighting bugs: Remove, retry, replicate and rejuvenate," IEEE Computer, vol. 40, no. 2, pp. 107-109, 2007.
-
(2007)
IEEE Computer
, vol.40
, Issue.2
, pp. 107-109
-
-
Grottke, M.1
Trivedi, K.S.2
-
7
-
-
0028994247
-
Software rejuvenation: Analysis, module and applications
-
Y. Huang, C. Kintala, N. Kolettis, and N. Fulton. "Software rejuvenation: analysis, module and applications," In Proc. Twenty-Fifth International Symposium on Fault-Tolerant Computing, pp. 381-390, 1995.
-
(1995)
Proc. Twenty-Fifth International Symposium on Fault-Tolerant Computing
, pp. 381-390
-
-
Huang, Y.1
Kintala, C.2
Kolettis, N.3
Fulton, N.4
-
8
-
-
34247487933
-
-
R. Matias and P. J. Freitas. An experimental study on software aging and rejuvenation in web servers, In Proc. 30th Annual International Computer Software and Applications Conference, 1, pp. 189-196, 2006
-
R. Matias and P. J. Freitas. "An experimental study on software aging and rejuvenation in web servers," In Proc. 30th Annual International Computer Software and Applications Conference, vol. 1, pp. 189-196, 2006.
-
-
-
-
9
-
-
84941181463
-
Operational profiles in software reliability engineering
-
J. D. Musa. "Operational profiles in software reliability engineering," IEEE Software, vol. 10, no. 2, pp. 14-32, 1993.
-
(1993)
IEEE Software
, vol.10
, Issue.2
, pp. 14-32
-
-
Musa, J.D.1
-
10
-
-
1542300135
-
Software aging and multifractality of memory resources
-
M. Shereshevsky, J. Crowell, B. Cukic, V. Gandikota, and Y. Liu. "Software aging and multifractality of memory resources," In Proc. IEEE International Conference on Dependable Systems and Networks, pp. 721-730, 2003.
-
(2003)
Proc. IEEE International Conference on Dependable Systems and Networks
, pp. 721-730
-
-
Shereshevsky, M.1
Crowell, J.2
Cukic, B.3
Gandikota, V.4
Liu, Y.5
|