{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T16:05:46Z","timestamp":1725638746972},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642271410"},{"type":"electronic","value":"9783642271427"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-27142-7_5","type":"book-chapter","created":{"date-parts":[[2011,12,3]],"date-time":"2011-12-03T10:31:32Z","timestamp":1322908292000},"page":"37-38","source":"Crossref","is-referenced-by-count":1,"title":["Environmental Diversity Techniques of Software Systems"],"prefix":"10.1007","author":[{"given":"Tadashi","family":"Dohi","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1006\/jmaa.2000.6939","volume":"249","author":"T. Dohi","year":"2000","unstructured":"Dohi, T., Kaio, N., Osaki, S.: The optimal age-dependent checkpoint strategy for a stochastic system subject to general failure mode. Journal of Mathematical Analysis and Applications\u00a0249, 80\u201394 (2000)","journal-title":"Journal of Mathematical Analysis and Applications"},{"issue":"6","key":"5_CR2","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1093\/comjnl\/44.6.473","volume":"44","author":"T. Dohi","year":"2001","unstructured":"Dohi, T., Goseva-Popstojanova, K., Trivedi, K.S.: Estimating software rejuvenation schedule in high assurance systems. The Computer Journal\u00a044(6), 473\u2013485 (2001)","journal-title":"The Computer Journal"},{"issue":"10","key":"5_CR3","first-page":"2931","volume":"E86-B","author":"T. Dohi","year":"2003","unstructured":"Dohi, T., Iwamoto, K., Okamura, H., Kaio, N.: Discrete availability models to rejuvenate a telecommunication billing application. IEICE Transactions on Communications (B)\u00a0E86-B(10), 2931\u20132939 (2003)","journal-title":"IEICE Transactions on Communications (B)"},{"issue":"8","key":"5_CR4","first-page":"2078","volume":"E87-D","author":"T. Dohi","year":"2004","unstructured":"Dohi, T., Suzuki, H., Trivedi, K.S.: Comparing software rejuvenation policies under different dependability measures. IEICE Transactions on Information and Systems (D)\u00a0E87-D(8), 2078\u20132085 (2004)","journal-title":"IEICE Transactions on Information and Systems (D)"},{"issue":"3","key":"5_CR5","first-page":"233","volume":"2","author":"T. Dohi","year":"2006","unstructured":"Dohi, T., Suzuki, H., Osaki, S.: Transient cost analysis of non-Markovian software systems with rejuvenation. International Journal of Performability Engineering\u00a02(3), 233\u2013243 (2006)","journal-title":"International Journal of Performability Engineering"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Dohi, T., Uemura, T.: An adaptive mode control algorithm of a scalable intrusion tolerant architecture. Journal of Computer and System Sciences (in press)","DOI":"10.1016\/j.jcss.2011.10.022"},{"issue":"6","key":"5_CR7","doi-asserted-by":"publisher","first-page":"528","DOI":"10.3844\/jcssp.2006.528.534","volume":"2","author":"H. Eto","year":"2006","unstructured":"Eto, H., Dohi, T.: Determining the optimal software rejuvenation schedule via semi-Markov decision process. Journal of Computer Science\u00a02(6), 528\u2013534 (2006)","journal-title":"Journal of Computer Science"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Iwamoto, K., Dohi, T., Kaio, N.: Estimating periodic software rejuvenation schedule in discrete operational circumstance. IEICE Transactions on Information and Systems (D)\u00a0E91-D(1) (2008)","DOI":"10.1093\/ietisy\/e91-d.1.23"},{"issue":"10","key":"5_CR9","first-page":"1368","volume":"E84-D","author":"H. Okamura","year":"2001","unstructured":"Okamura, H., Miyahara, S., Dohi, T., Osaki, S.: Performance evaluation of workload-based software rejuvenation scheme. IEICE Transactions on Information and Systems (D)\u00a0E84-D(10), 1368\u20131375 (2001)","journal-title":"IEICE Transactions on Information and Systems (D)"},{"issue":"8","key":"5_CR10","first-page":"2081","volume":"E86-A","author":"H. Okamura","year":"2003","unstructured":"Okamura, H., Miyahara, S., Dohi, T.: Dependability analysis of a transactionbased multi server system with rejuvenation. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (A)\u00a0E86-A (8), 2081\u20132090 (2003)","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (A)"},{"issue":"10","key":"5_CR11","first-page":"2165","volume":"E86-D","author":"H. Okamura","year":"2003","unstructured":"Okamura, H., Fujio, H., Dohi, T.: Fine-grained shock models to rejuvenate software systems. IEICE Transactions on Information and Systems (D)\u00a0E86-D(10), 2165\u20132171 (2003)","journal-title":"IEICE Transactions on Information and Systems (D)"},{"issue":"12","key":"5_CR12","doi-asserted-by":"publisher","first-page":"4498","DOI":"10.1093\/ietcom\/e88-b.12.4498","volume":"E88-B","author":"H. Okamura","year":"2005","unstructured":"Okamura, H., Miyahara, S., Dohi, T.: Rejuvenating communication network system with burst arrival. IEICE Transactions on Communications (B)\u00a0E88-B(12), 4498\u20134506 (2005)","journal-title":"IEICE Transactions on Communications (B)"},{"issue":"6","key":"5_CR13","doi-asserted-by":"publisher","first-page":"505","DOI":"10.3844\/jcssp.2006.505.512","volume":"2","author":"H. Okamura","year":"2006","unstructured":"Okamura, H., Iwamoto, K., Dohi, T.: A dynamic programming algorithm for software rejuvenation scheduling under distributed computation circumstance. Journal of Computer Science\u00a02(6), 505\u2013512 (2006)","journal-title":"Journal of Computer Science"},{"issue":"4","key":"5_CR14","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1142\/S0218539306002288","volume":"13","author":"H. Okamura","year":"2006","unstructured":"Okamura, H., Iwamoto, K., Dohi, T.: A DP-based optimal checkpointing algorithm for real-time appications. International Journal of Reliability, Quality and Safety Engineering\u00a013(4), 323\u2013340 (2006)","journal-title":"International Journal of Reliability, Quality and Safety Engineering"},{"key":"5_CR15","doi-asserted-by":"publisher","first-page":"1591","DOI":"10.1016\/j.jss.2009.06.058","volume":"83","author":"H. Okamura","year":"2010","unstructured":"Okamura, H., Dohi, T.: Comprehensive evaluation of aperiodic checkpointing and rejuvenation schemes in operational software system. Journal of Systems and Software\u00a083, 1591\u20131604 (2010)","journal-title":"Journal of Systems and Software"},{"issue":"2","key":"5_CR16","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/TDSC.2006.22","volume":"3","author":"T. Ozaki","year":"2006","unstructured":"Ozaki, T., Dohi, T., Okamura, H., Kaio, N.: Distribution-free checkpoint placement algorithms based on min-max principle. IEEE Transactions on Dependable and Secure Computing\u00a03(2), 130\u2013140 (2006)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"5_CR17","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/j.peva.2008.11.003","volume":"66","author":"T. Ozaki","year":"2009","unstructured":"Ozaki, T., Dohi, T., Kaio, N.: Numerical computation algorithms for sequential checkpoint placement. Performance Evaluation\u00a066, 311\u2013326 (2009)","journal-title":"Performance Evaluation"},{"issue":"12","key":"5_CR18","doi-asserted-by":"publisher","first-page":"2681","DOI":"10.1093\/ietisy\/e88-d.12.2681","volume":"E88-D","author":"K. Rinsaka","year":"2005","unstructured":"Rinsaka, K., Dohi, T.: Behavioral analysis of fault-torellant software systems with rejuvenation. IEICE Transactions on Information and Systems (D)\u00a0E88-D(12), 2681\u20132690 (2005)","journal-title":"IEICE Transactions on Information and Systems (D)"},{"issue":"12","key":"5_CR19","first-page":"2923","volume":"E85-A","author":"H. Suzuki","year":"2002","unstructured":"Suzuki, H., Dohi, T., Okamura, H.: Cost-effective analysis of periodic software rejuvenation policies for a telecommunication billing application. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (A)\u00a0E85-A (12), 2923\u20132932 (2002)","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (A)"},{"issue":"1","key":"5_CR20","doi-asserted-by":"publisher","first-page":"71","DOI":"10.4304\/jcm.5.1.71-80","volume":"5","author":"T. Uemura","year":"2010","unstructured":"Uemura, T., Dohi, T.: Optimal security patch management policies maximizing system availability. Journal of Communications\u00a05(1), 71\u201380 (2010)","journal-title":"Journal of Communications"},{"issue":"1","key":"5_CR21","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/TR.2010.2042101","volume":"59","author":"T. Uemura","year":"2010","unstructured":"Uemura, T., Dohi, T., Kaio, N.: Availability analysis of an intrusion tolerant distributed server system with preventive maintenance. IEEE Transactions on Reliability\u00a059(1), 18\u201329 (2010)","journal-title":"IEEE Transactions on Reliability"},{"issue":"2","key":"5_CR22","first-page":"289","volume":"11","author":"T. Uemura","year":"2010","unstructured":"Uemura, T., Dohi, T., Kaio, N.: Dependability analysis of a scalable intrusion tolerant architecture with two detection modes. Journal of Internet Technology\u00a011(2), 289\u2013298 (2010)","journal-title":"Journal of Internet Technology"}],"container-title":["Lecture Notes in Computer Science","Future Generation Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27142-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,20]],"date-time":"2019-04-20T01:12:26Z","timestamp":1555722746000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27142-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642271410","9783642271427"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27142-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}