{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T16:40:23Z","timestamp":1757781623720,"version":"3.41.0"},"reference-count":35,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000104","name":"National Aeronautics and Space Administration","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000104","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003471","name":"Harbin Engineering University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003471","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Mission Assurance Software Assurance Research Program under a task managed by JPL's Assurance Technology Program Office"},{"DOI":"10.13039\/501100003593","name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["60873036"],"award-info":[{"award-number":["60873036"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["J. Emerg. Technol. Comput. Syst."],"published-print":{"date-parts":[[2014,1]]},"abstract":"<jats:p>A number of studies have reported the phenomenon of \u201cSoftware aging\u201d, caused by resource exhaustion and characterized by progressive software performance degradation. In this article, we carry out an experimental study of software aging and rejuvenation for an on-line bookstore application, following the standard configuration of TPC-W benchmark. While real website is used for the bookstore, the clients are emulated. In order to reduce the time to application failures caused by memory leaks, we use the accelerated life testing (ALT) approach. We then select the Weibull time to failure distribution at normal level, to be used in a semi-Markov process, to compute the optimal software rejuvenation trigger interval. Since the validation of optimal rejuvenation trigger interval with emulated browsers will take an inordinate long time, we develop a simulation model to validate the ALT experimental results, and also estimate the steady-state availability to cross-validate the results of the semi-Markov availability model.<\/jats:p>","DOI":"10.1145\/2539118","type":"journal-article","created":{"date-parts":[[2014,1,14]],"date-time":"2014-01-14T13:39:57Z","timestamp":1389706797000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Software rejuvenation scheduling using accelerated life testing"],"prefix":"10.1145","volume":"10","author":[{"given":"Jing","family":"Zhao","sequence":"first","affiliation":[{"name":"Harbin Engineering University"}]},{"given":"Yuliang","family":"Jin","sequence":"additional","affiliation":[{"name":"Harbin Engineering University"}]},{"given":"Kishor S.","family":"Trivedi","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC"}]},{"given":"Rivalino Matias","family":"Jr.","sequence":"additional","affiliation":[{"name":"Federal University of Uberlandia, Uberlandia, Brazil"}]},{"given":"Yanbin","family":"Wang","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2014,1,13]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/GRID.2007.4354113"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2010.5544275"},{"key":"e_1_2_1_3_1","unstructured":"Apache. 2011a. The Apache HTTP Server Project. (2011). http:\/\/httpd.apache.org.  Apache. 2011a. The Apache HTTP Server Project. (2011). http:\/\/httpd.apache.org."},{"key":"e_1_2_1_4_1","unstructured":"Apache. 2011b. Apache tomcat. (2011). http:\/\/tomcat.apache.org\/.  Apache. 2011b. Apache tomcat. (2011). http:\/\/tomcat.apache.org\/."},{"key":"e_1_2_1_5_1","unstructured":"Apache. 2011c. Apache tomcat configuration reference - the HTTP connector. (2011). http:\/\/tomcat.apache.org\/tomcat-6.0-doc\/config\/http.html.  Apache. 2011c. Apache tomcat configuration reference - the HTTP connector. (2011). http:\/\/tomcat.apache.org\/tomcat-6.0-doc\/config\/http.html."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2005.853442"},{"key":"e_1_2_1_7_1","unstructured":"Bezenek T. Cain T. Dickson R. Heil T. Martin M. McCurdy C. Rajwar R. Weglarz E. Zilles C. and Lipasti M. 2011. TPC-W benchmark Java version. http:\/\/pharm.ece.wisc.edu\/tpcw.shtml.  Bezenek T. Cain T. Dickson R. Heil T. Martin M. McCurdy C. Rajwar R. Weglarz E. Zilles C. and Lipasti M. 2011. TPC-W benchmark Java version. http:\/\/pharm.ece.wisc.edu\/tpcw.shtml."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-5316(01)00037-2"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-006-0697-1"},{"volume-title":"Proceedings of the International Conference on Dependable Systems and Networks. IEEE, 478--482","author":"Cassidy K. J.","key":"e_1_2_1_10_1","unstructured":"Cassidy , K. J. , Gross , K. C. , and Malekpour , A . 2002. Advanced pattern recognition for detection of complex software aging phenomena in online transaction processing servers . In Proceedings of the International Conference on Dependable Systems and Networks. IEEE, 478--482 . Cassidy, K. J., Gross, K. C., and Malekpour, A. 2002. Advanced pattern recognition for detection of complex software aging phenomena in online transaction processing servers. In Proceedings of the International Conference on Dependable Systems and Networks. IEEE, 478--482."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.452.0311"},{"volume-title":"Proceedings of the 2001 Pacific Rim International Symposium on Dependable Computing. IEEE, 103--107","author":"Chen D.","key":"e_1_2_1_12_1","unstructured":"Chen , D. and Trivedi , K. S . 2001. Analysis of periodic preventive maintenance with general system failure distribution . In Proceedings of the 2001 Pacific Rim International Symposium on Dependable Computing. IEEE, 103--107 . Chen, D. and Trivedi, K. S. 2001. Analysis of periodic preventive maintenance with general system failure distribution. In Proceedings of the 2001 Pacific Rim International Symposium on Dependable Computing. IEEE, 103--107."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/826038.826926"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.656092"},{"volume-title":"Proceedings of the 9th International Symposium on Software Reliability Engineering. IEEE, 283--292","author":"Garg S.","key":"e_1_2_1_15_1","unstructured":"Garg , S. , van Moorsel , A. , Vaidyanathan , K. , and Trivedi , K. S . 1998b. A methodology for detection and estimation of software aging . In Proceedings of the 9th International Symposium on Software Reliability Engineering. IEEE, 283--292 . Garg, S., van Moorsel, A., Vaidyanathan, K., and Trivedi, K. S. 1998b. A methodology for detection and estimation of software aging. In Proceedings of the 9th International Symposium on Software Reliability Engineering. IEEE, 283--292."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2006.879609"},{"volume-title":"Proceedings of the 2008 IEEE First International Workshop on Software Aging and Rejuvenation (WoSAR). IEEE, 1--6.","author":"Grottke M.","key":"e_1_2_1_17_1","unstructured":"Grottke , M. , Matias , R. , and Trivedi , K. S . 2008. The fundamentals of software aging . In Proceedings of the 2008 IEEE First International Workshop on Software Aging and Rejuvenation (WoSAR). IEEE, 1--6. Grottke, M., Matias, R., and Trivedi, K. S. 2008. The fundamentals of software aging. In Proceedings of the 2008 IEEE First International Workshop on Software Aging and Rejuvenation (WoSAR). IEEE, 1--6."},{"volume-title":"Proceedings of the 2010 IEEE\/IFIP International Conference on Dependable Systems & Networks (DSN). IEEE, 447--456","author":"Grottke M.","key":"e_1_2_1_18_1","unstructured":"Grottke , M. , Nikora , A. P. , and Trivedi , K. S . 2010. An empirical investigation of fault types in space mission system software . In Proceedings of the 2010 IEEE\/IFIP International Conference on Dependable Systems & Networks (DSN). IEEE, 447--456 . Grottke, M., Nikora, A. P., and Trivedi, K. S. 2010. An empirical investigation of fault types in space mission system software. In Proceedings of the 2010 IEEE\/IFIP International Conference on Dependable Systems & Networks (DSN). IEEE, 447--456."},{"volume-title":"Proceedings of the 25th Symposium on Fault Tolerant Computing. IEEE, 381--390","author":"Huang Y.","key":"e_1_2_1_19_1","unstructured":"Huang , Y. , Kintala , C. , Kolettis , N. , and Fulton , N. D . 1995. Software rejuvenation: Analysis, module and applications . In Proceedings of the 25th Symposium on Fault Tolerant Computing. IEEE, 381--390 . Huang, Y., Kintala, C., Kolettis, N., and Fulton, N. D. 1995. Software rejuvenation: Analysis, module and applications. In Proceedings of the 25th Symposium on Fault Tolerant Computing. IEEE, 381--390."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2008.38"},{"volume-title":"Proceedings of the 2010 IEEE Second International Workshop on Software Aging and Rejuvenation (WoSAR). IEEE, 1--5.","author":"Mac\u00eado A.","key":"e_1_2_1_21_1","unstructured":"Mac\u00eado , A. , Ferreira , T. , and Matias , R . 2010. The mechanics of memory-related software aging . In Proceedings of the 2010 IEEE Second International Workshop on Software Aging and Rejuvenation (WoSAR). IEEE, 1--5. Mac\u00eado, A., Ferreira, T., and Matias, R. 2010. The mechanics of memory-related software aging. In Proceedings of the 2010 IEEE Second International Workshop on Software Aging and Rejuvenation (WoSAR). IEEE, 1--5."},{"key":"e_1_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Marshall E. 1992. Fatal error: How patriot overlooked a scud. Science (New York NY) 255 5050 1347.  Marshall E. 1992. Fatal error: How patriot overlooked a scud. Science (New York NY) 255 5050 1347.","DOI":"10.1126\/science.255.5050.1347"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2009.2034292"},{"volume-title":"Proceedings of the 2010 IEEE Second International Workshop on Software Aging and Rejuvenation (WoSAR). IEEE, 1--6.","author":"Matias R.","key":"e_1_2_1_24_1","unstructured":"Matias , R. , Beicker , I. , Leit\u00e3o , B. , and Maciel , P. R. M. 2010b. Measuring software aging effects through OS kernel instrumentation . In Proceedings of the 2010 IEEE Second International Workshop on Software Aging and Rejuvenation (WoSAR). IEEE, 1--6. Matias, R., Beicker, I., Leit\u00e3o, B., and Maciel, P. R. M. 2010b. Measuring software aging effects through OS kernel instrumentation. In Proceedings of the 2010 IEEE Second International Workshop on Software Aging and Rejuvenation (WoSAR). IEEE, 1--6."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2010.42"},{"key":"e_1_2_1_26_1","unstructured":"Meeker W. Q. and Escobar L. A. 1998. Statistical Methods for Reliability Data. Vol. 78. Wiley New York.  Meeker W. Q. and Escobar L. A. 1998. Statistical Methods for Reliability Data. Vol. 78. Wiley New York."},{"key":"e_1_2_1_27_1","volume-title":"Accelerated Testing: Statistical Models, Test Plans and Data Analyses","author":"Nelson W. B.","year":"2004","unstructured":"Nelson , W. B. 2004 . Accelerated Testing: Statistical Models, Test Plans and Data Analyses . Wiley-Interscience . Nelson, W. B. 2004. Accelerated Testing: Statistical Models, Test Plans and Data Analyses. Wiley-Interscience."},{"key":"e_1_2_1_28_1","unstructured":"Oracle. 2010. JSTAT - Java virtual machine statistics monitoring tool. (2010). http:\/\/download.oracle.com\/javase\/1.5.0\/docs\/tooldocs\/share\/jstat.html.  Oracle. 2010. JSTAT - Java virtual machine statistics monitoring tool. (2010). http:\/\/download.oracle.com\/javase\/1.5.0\/docs\/tooldocs\/share\/jstat.html."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1968.10480934"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2006.51"},{"key":"e_1_2_1_31_1","unstructured":"TPC. 2002. TPC Benchmark#8482; W specification version 1.8. (2002). http:\/\/www.tpc.org\/tpcw\/spec\/tpcw_V1.8.pdf.  TPC. 2002. TPC Benchmark#8482; W specification version 1.8. (2002). http:\/\/www.tpc.org\/tpcw\/spec\/tpcw_V1.8.pdf."},{"key":"e_1_2_1_32_1","volume-title":"Probability and statistics with reliability, queuing, and computer science applications","author":"Trivedi K. S.","unstructured":"Trivedi , K. S. 2002. Probability and statistics with reliability, queuing, and computer science applications ( 2 nd ed.), Wiley , New York . Trivedi, K. S. 2002. Probability and statistics with reliability, queuing, and computer science applications (2nd ed.), Wiley, New York.","edition":"2"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.15"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/0020772021000023022"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2011.24"}],"container-title":["ACM Journal on Emerging Technologies in Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2539118","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2539118","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:50Z","timestamp":1750232090000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2539118"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,1]]}},"alternative-id":["10.1145\/2539118"],"URL":"https:\/\/doi.org\/10.1145\/2539118","relation":{},"ISSN":["1550-4832","1550-4840"],"issn-type":[{"type":"print","value":"1550-4832"},{"type":"electronic","value":"1550-4840"}],"subject":[],"published":{"date-parts":[[2014,1]]},"assertion":[{"value":"2012-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-03-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-01-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}