{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T12:14:00Z","timestamp":1753272840667,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/icaci.2018.8377553","type":"proceedings-article","created":{"date-parts":[[2018,6,11]],"date-time":"2018-06-11T23:04:38Z","timestamp":1528758278000},"page":"741-746","source":"Crossref","is-referenced-by-count":13,"title":["Using machine learning for software aging detection in Android system"],"prefix":"10.1109","author":[{"given":"Shouyu","family":"Huo","sequence":"first","affiliation":[]},{"given":"Dongdong","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Xing","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jianwen","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Yingshou","family":"Zhong","sequence":"additional","affiliation":[]},{"given":"Haiguo","family":"Yu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"DeepLearn toolbox","year":"0","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2016.19"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WoSAR.2011.15"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2008.38"},{"key":"ref13","first-page":"1","article-title":"The fundamentals of software aging","volume":"44","author":"grottke","year":"2009","journal-title":"Proc Int Symp Software Reliability Engineering"},{"key":"ref14","first-page":"264","article-title":"Predicting web server crashed: A case study in comparing prediction algorithms","author":"alonso","year":"2009","journal-title":"the fifth Int Conference on Autonomic and Autonomous Systems (ICSA)"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/DSN.2010.5544275","article-title":"Adaptive on-line software aging prediction based on machine learning","author":"alonso","year":"2010","journal-title":"Proc of the 40th Annual IEEE\/IFIP Int Conf on Dependable Systems and Networks (DSN 2010)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2008.4575113"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/WOSAR.2010.5722095"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WOSAR.2010.5722093"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1379","DOI":"10.1080\/01621459.1968.10480934","article-title":"Estimates of the regression coefficient based on Kendall's tau","volume":"63","author":"ghosh","year":"1968","journal-title":"Journal of the American Statistical Association"},{"journal-title":"The load ranking of Adroid applications","year":"0","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2010.24"},{"journal-title":"Majority of Metrics","year":"0","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1998.730892"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.4018\/ijaras.2014040103"},{"key":"ref29","first-page":"599","article-title":"A practical guide to training restricted boltzmann machines","volume":"9","author":"hinton","year":"2012","journal-title":"Momentum"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2006.879609"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.25"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2012.97"},{"key":"ref2","first-page":"249","article-title":"Characterizing failures in mobile OSes: a case study with Android and Symbian","author":"maji","year":"2010","journal-title":"International Symposium on Software Reliability Engineering IEEE Computer Society"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-CSS-ICESS.2015.306"},{"journal-title":"IDC Smartphone OS Market Share","year":"0","key":"ref1"},{"key":"ref20","first-page":"125","article-title":"Multivariate time-series analysis method on software aging","volume":"6","author":"zheng","year":"2012","journal-title":"Journal of Frontiers of Computer Science and Technology"},{"key":"ref22","first-page":"60","article-title":"Detection of performance anomalies in web-based applications","author":"silva","year":"2010","journal-title":"9th IEEE Int'l Symp Network Computing and Applications (NCA)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2002.1028933"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2604381"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2014.38"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2016.20"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2013.213"}],"event":{"name":"2018 Tenth International Conference on Advanced Computational Intelligence (ICACI )","start":{"date-parts":[[2018,3,29]]},"location":"Xiamen","end":{"date-parts":[[2018,3,31]]}},"container-title":["2018 Tenth International Conference on Advanced Computational Intelligence (ICACI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8370614\/8377463\/08377553.pdf?arnumber=8377553","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T04:37:56Z","timestamp":1643171876000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8377553\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icaci.2018.8377553","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}