{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T04:04:40Z","timestamp":1770005080681,"version":"3.49.0"},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,9,14]],"date-time":"2021-09-14T00:00:00Z","timestamp":1631577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,14]],"date-time":"2021-09-14T00:00:00Z","timestamp":1631577600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["SFRH\/BD\/146181\/2019"],"award-info":[{"award-number":["SFRH\/BD\/146181\/2019"]}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["UID\/CEC\/00326\/2020"],"award-info":[{"award-number":["UID\/CEC\/00326\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["POCI-01-0247-FEDER-045907"],"award-info":[{"award-number":["POCI-01-0247-FEDER-045907"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Operational Program for Competitiveness and Internationalization","award":["POCI-01-0247-FEDER-039676"],"award-info":[{"award-number":["POCI-01-0247-FEDER-039676"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s10922-021-09619-3","type":"journal-article","created":{"date-parts":[[2021,9,14]],"date-time":"2021-09-14T10:02:51Z","timestamp":1631613771000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Model-Based Performability and Dependability Evaluation of a System with VM\u00a0Migration as Rejuvenation in the Presence of Bursty\u00a0Workloads"],"prefix":"10.1007","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3211-7951","authenticated-orcid":false,"given":"Matheus","family":"Torquato","sequence":"first","affiliation":[]},{"given":"Paulo","family":"Maciel","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Vieira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,14]]},"reference":[{"key":"9619_CR1","doi-asserted-by":"crossref","unstructured":"Akoush, S., Sohan, R., Rice, A., Moore, A.W., Hopper, A.: Predicting the performance of virtual machine migration. In: 2010 IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp. 37\u201346. IEEE (2010)","DOI":"10.1109\/MASCOTS.2010.13"},{"key":"9619_CR2","doi-asserted-by":"crossref","unstructured":"Araujo, J., Matos, R., Maciel, P., Matias, R., Beicker, I.: Experimental evaluation of software aging effects on the eucalyptus cloud computing infrastructure. In: Proceedings of the Middleware 2011 Industry Track Workshop, p. 4. ACM (2011)","DOI":"10.1145\/2090181.2090185"},{"issue":"1","key":"9619_CR3","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Depend. Secure Comput. 1(1), 11\u201333 (2004)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"issue":"1","key":"9619_CR4","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1023\/A:1009794200077","volume":"2","author":"A Avritzer","year":"1997","unstructured":"Avritzer, A., Weyuker, E.J.: Monitoring smoothly degrading systems for increased dependability. Empir. Softw. Eng. 2(1), 59\u201377 (1997)","journal-title":"Empir. Softw. Eng."},{"key":"9619_CR5","doi-asserted-by":"crossref","unstructured":"Bause, F.: Queueing petri nets-a formalism for the combined qualitative and quantitative analysis of systems. In: Proceedings of 5th International Workshop on Petri Nets and Performance Models, pp. 14\u201323. IEEE (1993)","DOI":"10.1109\/PNPM.1993.393439"},{"key":"9619_CR6","doi-asserted-by":"crossref","unstructured":"Bobbio, A.: System modelling with petri nets. In: Systems Reliability Assessment, pp. 103\u2013143. Springer (1990)","DOI":"10.1007\/978-94-009-0649-5_6"},{"key":"9619_CR7","unstructured":"Clark, C., Fraser, K., Hand, S., Hansen, J.G., Jul, E., Limpach, C., Pratt, I., Warfield, A.: Live migration of virtual machines. In: Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation-Volume 2, pp. 273\u2013286. USENIX Association (2005)"},{"issue":"1","key":"9619_CR8","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/2539117","volume":"10","author":"D Cotroneo","year":"2014","unstructured":"Cotroneo, D., Natella, R., Pietrantuono, R., Russo, S.: A survey of software aging and rejuvenation studies. ACM J. Emerg. Technol. Comput. Syst. 10(1), 8 (2014)","journal-title":"ACM J. Emerg. Technol. Comput. Syst."},{"key":"9619_CR9","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1016\/j.ress.2018.08.009","volume":"180","author":"T Dohi","year":"2018","unstructured":"Dohi, T., Zheng, J., Okamura, H., Trivedi, K.S.: Optimal periodic software rejuvenation policies based on interval reliability criteria. Reliab. Eng. Syst. Saf. 180, 463\u2013475 (2018)","journal-title":"Reliab. Eng. Syst. Saf."},{"issue":"7","key":"9619_CR10","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.ifacol.2018.06.277","volume":"51","author":"M Escheikh","year":"2018","unstructured":"Escheikh, M., Tayachi, Z., Barkaoui, K.: Performability evaluation of server virtualized systems under bursty workload. IFAC-PapersOnLine 51(7), 45\u201350 (2018)","journal-title":"IFAC-PapersOnLine"},{"issue":"2","key":"9619_CR11","first-page":"187","volume":"18","author":"G Feuerlicht","year":"2011","unstructured":"Feuerlicht, G., Burkon, L., Sebesta, M.: Cloud computing adoption: what are the issues. Syst. Integr. 18(2), 187\u2013192 (2011)","journal-title":"Syst. Integr."},{"key":"9619_CR12","doi-asserted-by":"crossref","unstructured":"Garg, S., Van Moorsel, A., Vaidyanathan, K., Trivedi, K.S.: A methodology for detection and estimation of software aging. In: Proceedings Ninth International Symposium on Software Reliability Engineering (Cat. No. 98TB100257), pp. 283\u2013292. IEEE (1998)","DOI":"10.1109\/ISSRE.1998.730892"},{"key":"9619_CR13","doi-asserted-by":"crossref","unstructured":"Grottke, M., Matias, R., Trivedi, K.S.: The fundamentals of software aging. In: 2008 IEEE International Conference on Software Reliability Engineering Workshops (ISSRE Wksp), pp. 1\u20136. IEEE (2008)","DOI":"10.1109\/ISSREW.2008.5355512"},{"key":"9619_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-8176-4987-6","volume-title":"Probability and Statistical Models: Foundations for Problems in Reliability and Financial Mathematics","author":"AK Gupta","year":"2010","unstructured":"Gupta, A.K., Zeng, W.B., Wu, Y.: Probability and Statistical Models: Foundations for Problems in Reliability and Financial Mathematics. Springer, New York (2010)"},{"key":"9619_CR15","unstructured":"Huang, Y., Kintala, C., Kolettis, N., Fulton, N.D.: Software rejuvenation: analysis, module and applications. In: Twenty-Fifth International Symposium on Fault-Tolerant Computing. Digest of Papers, pp. 381\u2013390. IEEE (1995)"},{"key":"9619_CR16","volume-title":"The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation, and Modeling","author":"R Jain","year":"1990","unstructured":"Jain, R.: The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation, and Modeling. Wiley, New York (1990)"},{"key":"9619_CR17","unstructured":"Kleinrock, L.: Queueing Systems, vol. i: Theory (1975)"},{"issue":"7","key":"9619_CR18","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1109\/TSE.2006.69","volume":"32","author":"S Kounev","year":"2006","unstructured":"Kounev, S.: Performance modeling and evaluation of distributed component-based systems using queueing petri nets. IEEE Trans. Softw. Eng. 32(7), 486\u2013502 (2006)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"9619_CR19","doi-asserted-by":"crossref","unstructured":"Kuch\u00e1rik, M., Balogh, Z.: Modeling of uncertainty with petri nets. In: Asian Conference on Intelligent Information and Database Systems, pp. 499\u2013509. Springer (2019)","DOI":"10.1007\/978-3-030-14799-0_43"},{"key":"9619_CR20","doi-asserted-by":"crossref","unstructured":"Liu, H., Xu, C.Z., Jin, H., Gong, J., Liao, X.: Performance and energy modeling for live migration of virtual machines. In: Proceedings of the 20th International Symposium on High Performance Distributed Computing, pp. 171\u2013182. ACM (2011)","DOI":"10.1145\/1996130.1996154"},{"issue":"7","key":"9619_CR21","doi-asserted-by":"publisher","first-page":"1006","DOI":"10.1108\/02635571111161262","volume":"111","author":"C Low","year":"2011","unstructured":"Low, C., Chen, Y., Wu, M.: Understanding the determinants of cloud computing adoption. Ind. Manag. Data Syst. 111(7), 1006\u20131023 (2011)","journal-title":"Ind. Manag. Data Syst."},{"key":"9619_CR22","doi-asserted-by":"crossref","unstructured":"Mac\u00eado, A., Ferreira, T.B., Matias, R.: The mechanics of memory-related software aging. In: 2010 IEEE Second International Workshop on Software Aging and Rejuvenation, pp. 1\u20135. IEEE (2010)","DOI":"10.1109\/WOSAR.2010.5722097"},{"key":"9619_CR23","doi-asserted-by":"crossref","unstructured":"Machida, F., Kim, D.S., Trivedi, K.S.: Modeling and analysis of software rejuvenation in a server virtualized system. In: 2010 IEEE Second International Workshop on Software Aging and Rejuvenation, pp. 1\u20136. IEEE (2010)","DOI":"10.1109\/WOSAR.2010.5722098"},{"issue":"3","key":"9619_CR24","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.peva.2012.09.003","volume":"70","author":"F Machida","year":"2013","unstructured":"Machida, F., Kim, D.S., Trivedi, K.S.: Modeling and analysis of software rejuvenation in a server virtualized system with live vm migration. Perform. Eval. 70(3), 212\u2013230 (2013)","journal-title":"Perform. Eval."},{"key":"9619_CR25","doi-asserted-by":"crossref","unstructured":"Machida, F., Miyoshi, N.: An optimal stopping problem for software rejuvenation in a job processing system. In: 2015 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), pp. 139\u2013143. IEEE (2015)","DOI":"10.1109\/ISSREW.2015.7392059"},{"key":"9619_CR26","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.ress.2017.05.019","volume":"168","author":"F Machida","year":"2017","unstructured":"Machida, F., Miyoshi, N.: Analysis of an optimal stopping problem for software rejuvenation in a deteriorating job processing system. Reliab. Eng. Syst. Saf. 168, 128\u2013135 (2017)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"9619_CR27","doi-asserted-by":"crossref","unstructured":"Machida, F., Nicola, V.F., Trivedi, K.S.: Job completion time on a virtualized server subject to software aging and rejuvenation. In: 2011 IEEE Third International Workshop on Software Aging and Rejuvenation, pp. 44\u201349. IEEE (2011)","DOI":"10.1109\/WoSAR.2011.10"},{"issue":"1","key":"9619_CR28","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/2539121","volume":"10","author":"F Machida","year":"2014","unstructured":"Machida, F., Nicola, V.F., Trivedi, K.S.: Job completion time on a virtualized server with software rejuvenation. ACM J. Emerg. Technol. Comput. Syst. 10(1), 10 (2014)","journal-title":"ACM J. Emerg. Technol. Comput. Syst."},{"key":"9619_CR29","doi-asserted-by":"crossref","unstructured":"Machida, F., Xiang, J., Tadano, K., Maeno, Y.: Aging-related bugs in cloud computing software. In: 2012 IEEE 23rd International Symposium on Software Reliability Engineering Workshops, pp. 287\u2013292. IEEE (2012)","DOI":"10.1109\/ISSREW.2012.97"},{"issue":"1","key":"9619_CR30","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1109\/TR.2016.2615880","volume":"66","author":"F Machida","year":"2016","unstructured":"Machida, F., Xiang, J., Tadano, K., Maeno, Y.: Lifetime extension of software execution subject to aging. IEEE Trans. Reliab. 66(1), 123\u2013134 (2016)","journal-title":"IEEE Trans. Reliab."},{"key":"9619_CR31","doi-asserted-by":"crossref","unstructured":"Maciel, P., Matos, R., Silva, B., Figueiredo, J., Oliveira, D., F\u00e9, I., Maciel, R., Dantas, J.: Mercury: performance and dependability evaluation of systems with exponential, expolynomial, and general distributions. In: 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC), pp. 50\u201357. IEEE (2017)","DOI":"10.1109\/PRDC.2017.16"},{"key":"9619_CR32","doi-asserted-by":"crossref","unstructured":"Matos, R., Araujo, J., Alves, V., Maciel, P.: Characterization of software aging effects in elastic storage mechanisms for private clouds. In: 2012 IEEE 23rd International Symposium on Software Reliability Engineering Workshops, pp. 293\u2013298. IEEE (2012)","DOI":"10.1109\/ISSREW.2012.82"},{"key":"9619_CR33","doi-asserted-by":"crossref","unstructured":"Maziku, H., Shetty, S.: Towards a network aware vm migration: Evaluating the cost of vm migration in cloud data centers. In: 2014 IEEE 3rd International Conference on Cloud Networking (CloudNet), pp. 114\u2013119. IEEE (2014)","DOI":"10.1109\/CloudNet.2014.6968978"},{"key":"9619_CR34","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T., et al.: The nist definition of cloud computing (2011)","DOI":"10.6028\/NIST.SP.800-145"},{"key":"9619_CR35","doi-asserted-by":"crossref","unstructured":"Melo, M., Araujo, J., Matos, R., Menezes, J., Maciel, P.: Comparative analysis of migration-based rejuvenation schedules on cloud availability. In: 2013 IEEE International Conference on Systems, Man, and Cybernetics, pp. 4110\u20134115. IEEE (2013)","DOI":"10.1109\/SMC.2013.701"},{"key":"9619_CR36","doi-asserted-by":"crossref","unstructured":"Melo, M., Maciel, P., Araujo, J., Matos, R., Araujo, C.: Availability study on cloud computing environments: live migration as a rejuvenation mechanism. In: 2013 43rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 1\u20136. IEEE (2013)","DOI":"10.1109\/DSN.2013.6575322"},{"issue":"3\u20134","key":"9619_CR37","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/0166-5316(92)90002-X","volume":"14","author":"JF Meyer","year":"1992","unstructured":"Meyer, J.F.: Performability: a retrospective and some pointers to the future. Perform. Eval. 14(3\u20134), 139\u2013156 (1992)","journal-title":"Perform. Eval."},{"issue":"1","key":"9619_CR38","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1109\/COMST.2015.2477041","volume":"18","author":"R Mijumbi","year":"2015","unstructured":"Mijumbi, R., Serrat, J., Gorricho, J.L., Bouten, N., De Turck, F., Boutaba, R.: Network function virtualization: state-of-the-art and research challenges. IEEE Commun. Surv. Tutor. 18(1), 236\u2013262 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"4","key":"9619_CR39","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/5.24143","volume":"77","author":"T Murata","year":"1989","unstructured":"Murata, T.: Petri nets: properties, analysis and applications. Proc. IEEE 77(4), 541\u2013580 (1989). https:\/\/doi.org\/10.1109\/5.24143","journal-title":"Proc. IEEE"},{"key":"9619_CR40","doi-asserted-by":"crossref","unstructured":"Myint, M.T.H., Thein, T.: Availability improvement in virtualized multiple servers with software rejuvenation and virtualization. In: 2010 Fourth International Conference on Secure Software Integration and Reliability Improvement, pp. 156\u2013162. IEEE (2010)","DOI":"10.1109\/SSIRI.2010.19"},{"key":"9619_CR41","doi-asserted-by":"publisher","first-page":"9273","DOI":"10.1109\/ACCESS.2019.2891282","volume":"7","author":"TA Nguyen","year":"2019","unstructured":"Nguyen, T.A., Min, D., Choi, E., Tran, T.D.: Reliability and availability evaluation for cloud data center networks using hierarchical models. IEEE Access 7, 9273\u20139313 (2019)","journal-title":"IEEE Access"},{"issue":"5","key":"9619_CR42","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1016\/j.im.2014.03.006","volume":"51","author":"T Oliveira","year":"2014","unstructured":"Oliveira, T., Thomas, M., Espadanal, M.: Assessing the determinants of cloud computing adoption: an analysis of the manufacturing and services sectors. Inf. Manag. 51(5), 497\u2013510 (2014)","journal-title":"Inf. Manag."},{"key":"9619_CR43","first-page":"185","volume":"2","author":"DA Patterson","year":"2002","unstructured":"Patterson, D.A., et al.: A simple way to estimate the cost of downtime. LISA 2, 185\u2013188 (2002)","journal-title":"LISA"},{"key":"9619_CR44","doi-asserted-by":"crossref","unstructured":"Pietrantuono, R., Russo, S.: A survey on software aging and rejuvenation in the cloud. Softw. Q. J. 1\u201332 (2019)","DOI":"10.1007\/s11219-019-09448-3"},{"key":"9619_CR45","unstructured":"Salfner, F., Tr\u00f6ger, P., Polze, A.: Downtime analysis of virtual machine live migration. In: The Fourth International Conference on Dependability (DEPEND 2011). IARIA, pp. 100\u2013105 (2011)"},{"key":"9619_CR46","first-page":"1","volume":"7","author":"B Schroeder","year":"2007","unstructured":"Schroeder, B., Gibson, G.A.: Disk failures in the real world: What does an mttf of 1, 000, 000 hours mean to you? FAST 7, 1\u201316 (2007)","journal-title":"FAST"},{"key":"9619_CR47","unstructured":"Siddiqui, S., Darbari, M., Yagyasen, D., et al.: Modelling and simulation of queuing models through the concept of petri nets (2020)"},{"key":"9619_CR48","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1145\/1272998.1273025","volume":"41","author":"S Soltesz","year":"2007","unstructured":"Soltesz, S., P\u00f6tzl, H., Fiuczynski, M.E., Bavier, A., Peterson, L.: ACM: Container-based operating system virtualization: a scalable, high-performance alternative to hypervisors. ACM SIGOPS Oper. Syst. Rev. 41, 275\u2013287 (2007)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"9619_CR49","doi-asserted-by":"crossref","unstructured":"Strunk, A.: Costs of virtual machine live migration: a survey. In: 2012 IEEE Eighth World Congress on Services, pp. 323\u2013329. IEEE (2012)","DOI":"10.1109\/SERVICES.2012.23"},{"issue":"2","key":"9619_CR50","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/s11390-009-9228-1","volume":"24","author":"T Thein","year":"2009","unstructured":"Thein, T., Park, J.S.: Availability analysis of application servers using software rejuvenation and virtualization. J. Comput. Sci. Technol. 24(2), 339\u2013346 (2009)","journal-title":"J. Comput. Sci. Technol."},{"issue":"2","key":"9619_CR51","first-page":"15","volume":"3","author":"M Torquato","year":"2018","unstructured":"Torquato, M., Araujo, J., Umesh, I., Maciel, P.: Sware: a methodology for software aging and rejuvenation experiments. J. Inf. Syst. Eng. Manag. 3(2), 15 (2018)","journal-title":"J. Inf. Syst. Eng. Manag."},{"key":"9619_CR52","doi-asserted-by":"crossref","unstructured":"Torquato, M., Maciel, P., Araujo, J., Umesh, I.: An approach to investigate aging symptoms and rejuvenation effectiveness on software systems. In: 2017 12th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1\u20136. IEEE (2017)","DOI":"10.23919\/CISTI.2017.7975806"},{"key":"9619_CR53","doi-asserted-by":"publisher","first-page":"138315","DOI":"10.1109\/ACCESS.2019.2943273","volume":"7","author":"M Torquato","year":"2019","unstructured":"Torquato, M., Maciel, P., Vieira, M.: A model for availability and security risk evaluation for systems with vmm rejuvenation enabled by vm migration scheduling. IEEE Access 7, 138315\u2013138326 (2019)","journal-title":"IEEE Access"},{"key":"9619_CR54","doi-asserted-by":"crossref","unstructured":"Torquato, M., Maciel, P., Vieira, M.: Availability and reliability modeling of vm migration as rejuvenation on a system under varying workload. Softw. Qual. J. 1\u201325 (2020)","DOI":"10.1007\/s11219-019-09474-1"},{"key":"9619_CR55","doi-asserted-by":"crossref","unstructured":"Torquato, M., Torquato, L., Maciel, P., Vieira, M.: Iaas cloud availability planning using models and genetic algorithms. In: 2019 9th Latin-American Symposium on Dependable Computing (LADC), pp. 1\u201310. IEEE (2019)","DOI":"10.1109\/LADC48089.2019.8995734"},{"issue":"9","key":"9619_CR56","doi-asserted-by":"publisher","first-page":"4817","DOI":"10.1007\/s11227-018-2485-4","volume":"74","author":"M Torquato","year":"2018","unstructured":"Torquato, M., Umesh, I., Maciel, P.: Models for availability and power consumption evaluation of a private cloud with vmm rejuvenation enabled by vm live migration. J. Supercomput. 74(9), 4817\u20134841 (2018)","journal-title":"J. Supercomput."},{"key":"9619_CR57","doi-asserted-by":"crossref","unstructured":"Torquato, M., Vieira, M.: Interacting srn models for availability evaluation of vm migration as rejuvenation on a system under varying workload. In: 2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), pp. 300\u2013307. IEEE (2018)","DOI":"10.1109\/ISSREW.2018.00022"},{"key":"9619_CR58","doi-asserted-by":"crossref","unstructured":"Torquato, M., Vieira, M.: An experimental study of software aging and rejuvenation in dockerd. In: 2019 15th European Dependable Computing Conference (EDCC), pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/EDCC.2019.00014"},{"key":"9619_CR59","doi-asserted-by":"crossref","unstructured":"Trivedi, K.S., Vaidyanathan, K., Goseva-Popstojanova, K.: Modeling and analysis of software aging and rejuvenation. In: Proceedings 33rd Annual Simulation Symposium (SS 2000), pp. 270\u2013279. IEEE (2000)","DOI":"10.1109\/SIMSYM.2000.844925"},{"issue":"2","key":"9619_CR60","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1109\/TDSC.2005.15","volume":"2","author":"K Vaidyanathan","year":"2005","unstructured":"Vaidyanathan, K., Trivedi, K.S.: A comprehensive model for software rejuvenation. IEEE Trans. Dependable Secure Comput. 2(2), 124\u2013137 (2005)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"9619_CR61","doi-asserted-by":"crossref","unstructured":"Valmari, A.: The state explosion problem. In: Advanced Course on Petri Nets, pp. 429\u2013528. Springer (1996)","DOI":"10.1007\/3-540-65306-6_21"},{"key":"9619_CR62","doi-asserted-by":"crossref","unstructured":"Voorsluys, W., Broberg, J., Venugopal, S., Buyya, R.: Cost of virtual machine live migration in clouds: a performance evaluation. In: IEEE International Conference on Cloud Computing, pp. 254\u2013265. Springer (2009)","DOI":"10.1007\/978-3-642-10665-1_23"},{"issue":"3","key":"9619_CR63","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.peva.2006.04.002","volume":"64","author":"D Wang","year":"2007","unstructured":"Wang, D., Xie, W., Trivedi, K.S.: Performability analysis of clustered systems with rejuvenation under varying workload. Perform. Eval. 64(3), 247\u2013265 (2007)","journal-title":"Perform. Eval."},{"issue":"4","key":"9619_CR64","first-page":"13","volume":"2","author":"EO Yeboah-Boateng","year":"2014","unstructured":"Yeboah-Boateng, E.O., Essandoh, K.A.: Factors influencing the adoption of cloud computing by small and medium enterprises in developing economies. Int. J. Emerg. Sci. Eng. 2(4), 13\u201320 (2014)","journal-title":"Int. J. Emerg. Sci. Eng."},{"key":"9619_CR65","doi-asserted-by":"crossref","unstructured":"Zheng, J., Okamura, H., Dohi, T.: A transient interval reliability analysis for software rejuvenation models with phase expansion. Softw. Qual. J. 1\u201322 (2019)","DOI":"10.1007\/s11219-019-09458-1"},{"key":"9619_CR66","doi-asserted-by":"crossref","unstructured":"Zimmermann, A.: Modelling and performance evaluation with timenet 4.4. In: International Conference on Quantitative Evaluation of Systems, pp. 300\u2013303. Springer (2017)","DOI":"10.1007\/978-3-319-66335-7_19"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-021-09619-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-021-09619-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-021-09619-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T09:38:05Z","timestamp":1725788285000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-021-09619-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,14]]},"references-count":66,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["9619"],"URL":"https:\/\/doi.org\/10.1007\/s10922-021-09619-3","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,14]]},"assertion":[{"value":"23 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 June 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 August 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 September 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"3"}}