{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T05:02:41Z","timestamp":1750395761530,"version":"3.41.0"},"reference-count":21,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["J. Emerg. Technol. Comput. Syst."],"published-print":{"date-parts":[[2014,1]]},"abstract":"<jats:p>\n            This article analyzes the completion time of a job running on a virtualized server subject to software aging and rejuvenation in a virtual machine monitor (VMM). A job running on the server may be interrupted by virtual machine (VM) failure, VMM failure or VMM rejuvenation. The job interruption is categorized as either preemptive-repeat (\n            <jats:italic>prt<\/jats:italic>\n            ), in which case the interrupted job needs to restart from the beginning, or preemptive-resume (\n            <jats:italic>prs<\/jats:italic>\n            ), in which case the job resumes execution from the point of interruption. Using a semi-Markov process (SMP) to model the server behavior, the steady-state server availability is computed and the theory developed in Kulkarni et al. [1987] is used to obtain the Laplace-Stieltjes transform (LST) of the job completion time. In the numerical experiments, we introduce four types of aging behavior of VMM. The effectiveness of VMM rejuvenation on job completion time is discussed in association with the type of interruption it causes and the VMM aging type. With our parameter settings, VMM rejuvenation with\n            <jats:italic>prs<\/jats:italic>\n            job interruption improves the performance of job execution regardless of the aging type, with performance degradation is taken into account.\n          <\/jats:p>","DOI":"10.1145\/2539121","type":"journal-article","created":{"date-parts":[[2014,1,14]],"date-time":"2014-01-14T13:39:57Z","timestamp":1389706797000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["Job completion time on a virtualized server with software rejuvenation"],"prefix":"10.1145","volume":"10","author":[{"given":"Fumio","family":"Machida","sequence":"first","affiliation":[{"name":"NEC Knowledge Discovery Research Laboratories, NEC Corporation"}]},{"given":"Victor F.","family":"Nicola","sequence":"additional","affiliation":[{"name":"University of Twente"}]},{"given":"Kishor S.","family":"Trivedi","sequence":"additional","affiliation":[{"name":"Duke University"}]}],"member":"320","published-online":{"date-parts":[[2014,1,13]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2005.853442"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.257705"},{"volume-title":"Proceedings of the International Workshop on Petri Nets and Performance Models. 142--151","author":"Ciardo G.","key":"e_1_2_1_3_1","unstructured":"Ciardo , G. , Muppala , J. K. , and Trivedi , K. S . 1989. SPNP: Stochastic Petri net package . In Proceedings of the International Workshop on Petri Nets and Performance Models. 142--151 . Ciardo, G., Muppala, J. K., and Trivedi, K. S. 1989. SPNP: Stochastic Petri net package. In Proceedings of the International Workshop on Petri Nets and Performance Models. 142--151."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/17.4.371"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/44.6.473"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/233013.233050"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2006.879609"},{"volume-title":"Proceedings of the 2010 IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN'10)","author":"Grottke M.","key":"e_1_2_1_8_1","unstructured":"Grottke , M. , Nikora , A. P. , and Trivedi , K. S . 2010. An empirical investigation of fault types in space mission system software . In Proceedings of the 2010 IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN'10) . 447--456. Grottke, M., Nikora, A. P., and Trivedi, K. S. 2010. An empirical investigation of fault types in space mission system software. In Proceedings of the 2010 IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN'10). 447--456."},{"volume-title":"Proceedings of the International Symposium on Fault Tolerant Computing (FTCS'95)","author":"Huang Y.","key":"e_1_2_1_9_1","unstructured":"Huang , Y. , Kintala , C. , Kolettis , N. , and Fulton , N. D . 1995. Software rejuvenation: Analysis, module and applications . In Proceedings of the International Symposium on Fault Tolerant Computing (FTCS'95) . 381--390. Huang, Y., Kintala, C., Kolettis, N., and Fulton, N. D. 1995. Software rejuvenation: Analysis, module and applications. In Proceedings of the International Symposium on Fault Tolerant Computing (FTCS'95). 381--390."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.6"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.2307\/1427109"},{"volume-title":"Proceedings of the 2nd International Workshop on Software Aging and Rejuvenation (WoSAR'10)","author":"Machida F.","key":"e_1_2_1_12_1","unstructured":"Machida , F. , Kim , D. S. , and Trivedi , K. S . 2010. Modeling and analysis of software rejuvenation in a server virtualized system . In Proceedings of the 2nd International Workshop on Software Aging and Rejuvenation (WoSAR'10) . 1--6. Machida, F., Kim, D. S., and Trivedi, K. S. 2010. Modeling and analysis of software rejuvenation in a server virtualized system. In Proceedings of the 2nd International Workshop on Software Aging and Rejuvenation (WoSAR'10). 1--6."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/WoSAR.2011.10"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2011.33"},{"volume-title":"Numerical Inversion of Laplace Transform","author":"Mallet A.","key":"e_1_2_1_15_1","unstructured":"Mallet . A. 2000. Numerical Inversion of Laplace Transform . In Wolfram Library Archive . http:\/\/library. wolfram.com\/infocenter\/MathSource\/2691\/. Mallet. A. 2000. Numerical Inversion of Laplace Transform. In Wolfram Library Archive. http:\/\/library. wolfram.com\/infocenter\/MathSource\/2691\/."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2010.42"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.233168"},{"volume-title":"Proceedings of the International Service Availability Symposium (ISAS'08)","author":"Okamura H.","key":"e_1_2_1_18_1","unstructured":"Okamura , H. and Dohi , T . 2008. Analysis of a software system with rejuvenation, restoration and checkpointing . In Proceedings of the International Service Availability Symposium (ISAS'08) . 110--128. Okamura, H. and Dohi, T. 2008. Analysis of a software system with rejuvenation, restoration and checkpointing. In Proceedings of the International Service Availability Symposium (ISAS'08). 110--128."},{"key":"e_1_2_1_19_1","volume-title":"Probability and Statistics with Reliability, Queuing, and Computer Science Applications","author":"Trivedi K. S.","unstructured":"Trivedi , K. S. 2001. Probability and Statistics with Reliability, Queuing, and Computer Science Applications 2 nd Ed. Wiley . Trivedi, K. S. 2001. Probability and Statistics with Reliability, Queuing, and Computer Science Applications 2nd Ed. Wiley.","edition":"2"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.15"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2011.24"}],"container-title":["ACM Journal on Emerging Technologies in Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2539121","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2539121","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:50Z","timestamp":1750232090000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2539121"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,1]]}},"alternative-id":["10.1145\/2539121"],"URL":"https:\/\/doi.org\/10.1145\/2539121","relation":{},"ISSN":["1550-4832","1550-4840"],"issn-type":[{"type":"print","value":"1550-4832"},{"type":"electronic","value":"1550-4840"}],"subject":[],"published":{"date-parts":[[2014,1]]},"assertion":[{"value":"2012-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2012-11-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-01-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}