{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:29:58Z","timestamp":1773329398195,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540442523","type":"print"},{"value":"9783540457985","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45798-4_13","type":"book-chapter","created":{"date-parts":[[2007,7,3]],"date-time":"2007-07-03T01:42:40Z","timestamp":1183426960000},"page":"290-317","source":"Crossref","is-referenced-by-count":2,"title":["Measurement-Based Analysis of System Dependability Using Fault Injection and Field Failure Data"],"prefix":"10.1007","author":[{"given":"Ravishankar K.","family":"Iyer","sequence":"first","affiliation":[]},{"given":"Zbigniew","family":"Kalbarczyk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,5]]},"reference":[{"issue":"2","key":"13_CR1","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1109\/32.44380","volume":"16","author":"J. Arlat","year":"1990","unstructured":"J. Arlat, et al., \u201cFault Injection for Dependability Validation-A Methodology and Some Applications,\u201d IEEE Trans. On Software Engineering, Vol. 16, No. 2, pp. 166\u2013182, Feb. 1990.","journal-title":"IEEE Trans. On Software Engineering"},{"issue":"8","key":"13_CR2","doi-asserted-by":"publisher","first-page":"913","DOI":"10.1109\/12.238482","volume":"42","author":"J. Arlat","year":"1993","unstructured":"J. Arlat, et al., \u201cFault Injection and Dependability Evaluation of Fault-Tolerant Systems,\u201d IEEE Trans. On Computers, Vol. 42, No. 8, pp.913\u2013923, Aug. 1993.","journal-title":"IEEE Trans. On Computers"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"D. Avresky, et al., \u201cFault Injection for the Formal Testing of Fault Tolerance,\u201d Proc. 22nd Int. Symp. Fault-Tolerant Computing, pp. 345\u2013354, June 1992.","DOI":"10.1109\/FTCS.1992.243566"},{"key":"13_CR4","unstructured":"S. Bagchi, \u201cHierarchical error detection in a software-implemented fault tolerance (SIFT) environment,\u201d Ph.D. Thesis, University of Illinois, Urbana, IL, 2001."},{"key":"13_CR5","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1109\/12.54853","volume":"39","author":"J.H. Barton","year":"1990","unstructured":"J.H. Barton, E.W. Czeck, Z.Z. Segall, and D.P. Siewiorek, \u201cFault injection experiments using FIAT,\u201d IEEE Trans. Computers, Vol.39, pp.575\u2013582, Apr. 1990.","journal-title":"IEEE Trans. Computers"},{"key":"13_CR6","unstructured":"X. Castillo and D.P. Siewiorek, &quot;A Workload Dependent Software Reliability Prediction Model,&quot; Proc. 12th Int. Symp. Fault-Tolerant Computing, pp.279\u2013286, 1982."},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"R. Chillarege, S. Biyani, and J. Rosenthal, &quot;Measurement Of Failure Rate in Widely Distributed Software,&quot; Proc. 25th Int. Symp. Fault-Tolerant Computing, pp. 424\u2013433, 1995.","DOI":"10.1109\/FTCS.1995.466957"},{"issue":"4","key":"13_CR8","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1109\/24.58719","volume":"39","author":"J. Gray","year":"1990","unstructured":"J. Gray, \u201cA Census of Tandem System Availability between 1985 and 1990,\u201d IEEE Trans. Reliability, Vol. 39, No. 4, pp. 409\u2013418, 1990.","journal-title":"IEEE Trans. Reliability"},{"issue":"4","key":"13_CR9","doi-asserted-by":"publisher","first-page":"478","DOI":"10.1109\/12.2195","volume":"37","author":"M.C. Hsueh","year":"1988","unstructured":"M.C. Hsueh, R.K. Iyer, and K.S. Trivedi, &quot;Performability Modeling Based on Real Data: A Case Study,&quot; IEEE Trans. Computers, Vol. 37, No.4, pp. 478\u2013484, April 1988.","journal-title":"IEEE Trans. Computers"},{"key":"13_CR10","unstructured":"R. Iyer, D. Tang, \u201cExperimental Analysis of Computer System Dependability,\u201d Chapter 5 in Fault Tolerant Computer Design, D.K. Pradhan, Prentice Hall, pp.282\u2013392, 1996."},{"issue":"12","key":"13_CR11","doi-asserted-by":"publisher","first-page":"1438","DOI":"10.1109\/TSE.1985.232180","volume":"SE-11","author":"R.K. Iyer","year":"1985","unstructured":"R.K. Iyer and D.J. Rossetti, \u201cEffect of System Workload on Operating System Reliability: A Study on IBM 3081,\u201d IEEE Trans. Software Engineering, Vol. SE-11, No. 12, pp. 1438\u20131448, 1985.","journal-title":"IEEE Trans. Software Engineering"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"M. Kalyanakrishnam, \u201cFailure Data Analysis of LAN of Windows NT Based Computers,\u201d Proc. 18th Symp. on Reliable Distributed Systems, pp.178\u2013187, October 1999.","DOI":"10.1109\/RELDIS.1999.805094"},{"issue":"6","key":"13_CR13","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1109\/71.774907","volume":"10","author":"Z. Kalbarczyk","year":"1999","unstructured":"Z. Kalbarczyk, R. Iyer, S. Bagchi, K. Whisnant, \u201cChameleon: A software infrastructure for adaptive fault tolerance,\u201d IEEE Trans. on Parallel and Distributed Systems, vol. 10, no. 6, pp. 560\u2013579, 1999.","journal-title":"IEEE Trans. on Parallel and Distributed Systems"},{"key":"13_CR14","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1109\/12.364536","volume":"44","author":"G.A. Kanawati","year":"1995","unstructured":"G.A. Kanawati, N.A. Kanawati, and J.A. Abraham, \u201cFERRARI: A flexible software-based fault and error injection system,\u201d IEEE Trans. Computers, Vol.44, pp.248\u2013260, Feb. 1995.","journal-title":"IEEE Trans. Computers"},{"key":"13_CR15","unstructured":"I. Lee and R.K. Iyer, \u201cAnalysis of Software Halts in Tandem System,\u201d Proc. 3rd Int. Symp. Software Reliability Engineering, pp. 227\u2013236, 1992."},{"key":"13_CR16","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1109\/32.473217","volume":"21","author":"I. Lee","year":"1995","unstructured":"I. Lee and R.K. Iyer, \u201cSoftware Dependability in the Tandem GUARDIAN Operating System,\u201d IEEE Trans. on Software Engineering, Vol. 21, No. 5, pp. 455\u2013467, 1995.","journal-title":"IEEE Trans. on Software Engineering"},{"issue":"4","key":"13_CR17","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1109\/24.58720","volume":"39","author":"T.T. Lin","year":"1990","unstructured":"T.T. Lin, D.P. Siewiorek, \u201cError Log Analysis: Statistical Modeling and Heuristic Trend Analysis,\u201d IEEE Trans. Reliability, Vol. 39, No. 4, pp.419\u2013432, 1990.","journal-title":"IEEE Trans. Reliability"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"H. Maderia, R. Some, F. Moereira, D. Costa, D. Rennels, \u201cExperimental evaluation of a COTS system for space applications,\u201d Proc. Of Int. Conf. On Dependable Systems and Networks (DSN\u2019 02), Washington DC, pp.325\u2013330, June 2002.","DOI":"10.1109\/DSN.2002.1028916"},{"key":"13_CR19","unstructured":"Message Passing Interface Forum, \u201cMPI-2: Extensions to the Message Passing Interface,\u201d http:\/\/www.mpi-forum.org\/docs\/mpi-20.ps ."},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"J.F. Meyer and L. Wei, \u201cAnalysis of Workload Influence on Dependability\u201d Proc. 18th Int. Symp. Fault-Tolerant Computing, pp.84\u201389, 1988.","DOI":"10.1109\/FTCS.1988.5301"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"S. Mourad and D. Andrews, \u201cOn the Reliability of the IBM MVS\/XA Operating System,\u201d IEEE Trans. on Software Engineering, October 1987.","DOI":"10.1109\/TSE.1987.232855"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"D. Stott, B. Floering, Z. Kalbarczyk, and R. Iyer, \u201cDependability assessment in distributed systems with lightweight fault injectors in NFTAPE,\u201d Proc. Int. Performance and Dependability Symposium, IPDS-00, pp. 91\u2013100, 2000.","DOI":"10.1109\/IPDS.2000.839467"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"M.S. Sullivan, R. Chillarege,\u201cSoftware Defects and Their Impact on System Availability \u2014 A Study of Field Failures in Operating Systems,\u201d Proc. 21st Int. Symp. Fault-Tolerant Computing, pp. 2\u20139, 1991.","DOI":"10.1109\/FTCS.1991.146625"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"M.S. Sullivan and R. Chillarege, \u201cA Comparison of Software Defects in Database Management Systems and Operating Systems,\u201d Proc. 22nd Int. Symp. Fault-Tolerant Computing, pp.475\u2013484, 1992.","DOI":"10.1109\/FTCS.1992.243586"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"D. Tang and R.K. Iyer, \u201cAnalysis of the VAX\/VMS Error Logs in Multicomputer Environments \u2014 A Case Study of Software Dependability,\u201d Proc. 3rd Int. Symp. Software Reliability Engineering, Research Triangle Park, North Carolina, pp. 216\u2013226, October 1992.","DOI":"10.1109\/ISSRE.1992.285886"},{"issue":"1","key":"13_CR26","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/12.192214","volume":"42","author":"D. Tang","year":"1993","unstructured":"D. Tang and R.K. Iyer, &quot;Dependability Measurement and Modeling of a Multicomputer Systems,&quot; IEEE Trans. Computers, Vol. 42, No. 1, pp.62\u201375, January 1993.","journal-title":"IEEE Trans. Computers"},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"A. Thakur, R.K. Iyer, L. Young, I. Lee, &quot;Analysis of Failures in the Tandem NonStop-UX Operating System,&quot; Proc. Int\u2019l Symp. Software Reliability Engineering, pp. 40\u201349, 1995.","DOI":"10.1109\/ISSRE.1995.497642"},{"key":"13_CR28","unstructured":"M.M. Tsao and D.P. Siewiorek, \u201cTrend Analysis on System Error files,\u201d Proc. 13th Int. Symp. Fault-Tolerant Computing, pp. 116\u2013119, June 1983."},{"issue":"6","key":"13_CR29","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1109\/TC.1984.1676482","volume":"C-33","author":"P. Velardi","year":"1984","unstructured":"P. Velardi and R.K. Iyer, \u201cA Study of Software Failures and Recovery in the MVS Operating System\u201d IEEE Trans. On Computers, Vol. C-33, No. 6, pp.564\u2013568, June 1984.","journal-title":"IEEE Trans. On Computers"},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"K. Whisnant, Z. Kalbarczyk, and R. Iyer, \u201cMicro-checkpointing: Checkpointing for multithreaded applications,\u201d in Proceedings of the 6th International On-Line Testing Workshop, July 2000.","DOI":"10.1109\/OLT.2000.856604"},{"key":"13_CR31","unstructured":"K. Whisnant, R. Iyer, Z. Kalbarczyk, P. Jones, \u201cAn Experimental Evaluation of the ARMOR-based REE Software-Implemented Fault Tolerance Environment,\u201d pending technical report, University of Illinois, Urbana, IL, 2001."},{"key":"13_CR32","doi-asserted-by":"crossref","unstructured":"K. Whisnant, et al., \u201cAn Experimental Evaluation of the REE SIFTEnvironment for Spaceborne Applications,\u201d Proc. Of Int. Conf. On Dependable Systems and Networks (DSN\u2019 02), Washington DC, pp. 585\u2013594, June 2002.","DOI":"10.1109\/DSN.2002.1029004"}],"container-title":["Lecture Notes in Computer Science","Performance Evaluation of Complex Systems: Techniques and Tools"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45798-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T03:32:41Z","timestamp":1737171161000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45798-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540442523","9783540457985"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/3-540-45798-4_13","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]}}}