{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T09:23:25Z","timestamp":1760606605262,"version":"3.37.3"},"reference-count":79,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772055","61872169"],"award-info":[{"award-number":["61772055","61872169"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Equipment Preliminary R&amp;D Project of China","award":["41402020102"],"award-info":[{"award-number":["41402020102"]}]},{"DOI":"10.13039\/501100006579","name":"Ministry of Industry and Information Technology of the People&#x0027;s Republic of China","doi-asserted-by":"publisher","award":["JSZL2016601B003"],"award-info":[{"award-number":["JSZL2016601B003"]}],"id":[{"id":"10.13039\/501100006579","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/tr.2018.2881306","type":"journal-article","created":{"date-parts":[[2018,12,3]],"date-time":"2018-12-03T19:21:23Z","timestamp":1543864883000},"page":"633-652","source":"Crossref","is-referenced-by-count":21,"title":["Two-Level Rejuvenation for Android Smartphones and Its Optimization"],"prefix":"10.1109","volume":"68","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4046-0453","authenticated-orcid":false,"given":"Yu","family":"Qiao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7922-9067","authenticated-orcid":false,"given":"Zheng","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Yunyu","family":"Fang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8778-5829","authenticated-orcid":false,"given":"Fangyun","family":"Qin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7396-6330","authenticated-orcid":false,"given":"Kishor S.","family":"Trivedi","sequence":"additional","affiliation":[]},{"given":"Kai-Yuan","family":"Cai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/RAMS.2016.7448076"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/CIMCA.2008.113"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1093\/ietisy\/e88-d.12.2681"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/DEPCOS-RELCOMEX.2006.7"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.17706\/jsw.11.6.554-568"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/2539117"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/DepCoS-RELCOMEX.2008.13"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1968.10480934"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2012.09.003"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2013.6688905"},{"key":"ref78","first-page":"389","article-title":"Characterizing and detecting resource leaks in android applications","author":"guo","year":"2014","journal-title":"Proc IEEE Int Conf Automated Software Engineering"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2014.32"},{"year":"0","key":"ref33"},{"year":"0","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/WoSAR.2011.9"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/0166-5316(94)90021-3"},{"year":"0","key":"ref37"},{"year":"0","key":"ref36"},{"year":"0","key":"ref35"},{"year":"0","key":"ref34"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2013.05.010"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2000.897287"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2006.09.017"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/44.6.473"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2016.2570539"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ISADS.2011.92"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2539121"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2012.93"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2000.895436"},{"journal-title":"Modeling and Analysis of Stochastic Systems","year":"1995","author":"kulkarni","key":"ref29"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2002.1180199"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC.2012.111"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21393-9_8"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/12.656092"},{"year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-1759-6_92"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISIP.2008.19"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2006.04.002"},{"key":"ref24","first-page":"241","article-title":"Adaptive software rejuvenation: degradation model and rejuvenation scheme","author":"bao","year":"0","journal-title":"Proc Int Conf Dependable Syst Netw"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2006.879609"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(01)00107-8"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/asmb.945"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2864960"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2009.39"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2539118"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2004.02.011"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/RAMS.2013.6517695"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2012.07.004"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/0166-5316(96)00038-7"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2005.853442"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/SIMSYM.2000.844925"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1995.497656"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2016.20"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.25"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.2478\/jamsi-2014-0009"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.15"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2016.2615880"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2894755"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-Berlin.2015.7391243"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2013.6689690"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2016.19"},{"key":"ref18","first-page":"22","article-title":"Time and load based software rejuvenation: Policy, evaluation and optimality","author":"garg","year":"0","journal-title":"Proc Fault Tolerant Comput Symp"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/qre.1862"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1995.466961"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2017.05.019"},{"year":"0","key":"ref6"},{"year":"0","key":"ref5"},{"year":"0","key":"ref8"},{"year":"0","key":"ref7"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2017.27"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2013.213"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2010.5544284"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2016.09.021"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2012.09.004"},{"key":"ref47","first-page":"178","article-title":"Fault triggers in open-source software: An experience report","author":"cotroneo","year":"2014","journal-title":"Proc IEEE Int Symp Softw Rel Eng"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1002\/9781119285441"},{"key":"ref41","first-page":"247","article-title":"Performance analysis of a redundant system with Weibull failure and repair laws","volume":"37","author":"kumar","year":"2016","journal-title":"Investigaci&#x00F3;n Oper"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2015.12.084"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2014.10.008"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/8727549\/08556513.pdf?arnumber=8556513","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:53:31Z","timestamp":1657745611000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8556513\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":79,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tr.2018.2881306","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"type":"print","value":"0018-9529"},{"type":"electronic","value":"1558-1721"}],"subject":[],"published":{"date-parts":[[2019,6]]}}}