{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T21:27:49Z","timestamp":1767907669082,"version":"3.49.0"},"reference-count":33,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"10","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2020,10,1]]},"DOI":"10.1587\/transinf.2019edp7321","type":"journal-article","created":{"date-parts":[[2020,9,30]],"date-time":"2020-09-30T22:32:21Z","timestamp":1601505141000},"page":"2133-2142","source":"Crossref","is-referenced-by-count":4,"title":["Optimal Rejuvenation Policies for Non-Markovian Availability Models with Aperiodic Checkpointing"],"prefix":"10.1587","volume":"E103.D","author":[{"given":"Junjun","family":"ZHENG","sequence":"first","affiliation":[{"name":"Department of Information Science and Engineering, Ritsumeikan University"}]},{"given":"Hiroyuki","family":"OKAMURA","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, Graduate School of Engineering, Hiroshima University"}]},{"given":"Tadashi","family":"DOHI","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, Graduate School of Engineering, Hiroshima University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] M. Grottke and K.S. Trivedi, \u201cFighting bugs: remove, retry, replicate, and rejuvenate,\u201d IEEE Computer, vol.40, no.2, pp.107-109, 2007. DOI:10.1109\/MC.2007.55 10.1109\/mc.2007.55","DOI":"10.1109\/MC.2007.55"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] Y. Huang, C. Kintala, N. Kolettis, and N.D. Funton, \u201cSoftware rejuvenation: analysis, module and applications,\u201d Proc. 25th IEEE International Symposium on Fault Tolerant Computing (FTC&apos;95), IEEE CPS, pp.381-390, 1995. DOI:10.1109\/FTCS.1995.466961 10.1109\/ftcs.1995.466961","DOI":"10.1109\/FTCS.1995.466961"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] K.S. Trivedi and K. Vaidyanathan, \u201cSoftware aging and rejuvenation,\u201d Wiley Encyclopedia of Computer Science and Engineering, pp.1-8, John Wiley &amp; Sons, 2007. DOI:10.1002\/9780470050118. ecse394 10.1002\/9780470050118.ecse394","DOI":"10.1002\/9780470050118"},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] J. Alonso, R. Matias, E. Vicente, A. Maria, and K.S. Trivedi, \u201cA comparative experimental study of software rejuvenation overhead,\u201d Performance Evaluation, vol.70, no.3, pp.231-250, 2013. DOI:10.1016\/j.peva.2012.09.002 10.1016\/j.peva.2012.09.002","DOI":"10.1016\/j.peva.2012.09.002"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] J. Zheng, H. Okamura, L. Li, and T. Dohi, \u201cA comprehensive evaluation of software rejuvenation policies for transaction systems with Markovian arrivals,\u201d IEEE Trans. Rel., vol.66, no.4, pp.1157-1177, 2017. DOI:10.1109\/TR.2017.2741526 10.1109\/tr.2017.2741526","DOI":"10.1109\/TR.2017.2741526"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] G. Ning, J. Zhao, Y. Lou, J. Alonso, R. Matias, K.S. Trivedi, B.-B. Yin, and K.-Y. Cai, \u201cOptimization of two-granularity software rejuvenation policy based on the Markov regenerative process,\u201d IEEE Trans. Rel., vol.65, no.4, pp.1630-1646, 2016. DOI:10.1109\/TR. 2016.2570539 10.1109\/tr.2016.2570539","DOI":"10.1109\/TR.2016.2570539"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] T. Dohi, J. Zheng, H. Okamura, and K.S. Trivedi, \u201cOptimal periodic software rejuvenation policies based on interval reliability criteria,\u201d Reliability Engineering and System Safety, vol.180, pp.463-475, 2018. DOI:10.1016\/j.ress.2018.08.009 10.1016\/j.ress.2018.08.009","DOI":"10.1016\/j.ress.2018.08.009"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] Y. Zhang and K. Chakrabarty, \u201cFault recovery based on checkpointing for hard real-time embedded systems,\u201d Proc. 18th IEEE Symposium on Defect and Fault Tolerance in VLSI Systems (DFT&apos;03), IEEE CPS, pp.320-327, 2003. DOI:10.1109\/DFTVS.2003.1250127 10.1109\/dftvs.2003.1250127","DOI":"10.1109\/DFTVS.2003.1250127"},{"key":"9","unstructured":"[9] S. Fukumoto, N. Kaio, and S. Osaki, \u201cOptimal checkpointing policies using the checkpointing density,\u201d Journal of Information Processing, vol.15, no.1, pp.87-92, 1992."},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] A. Ranganathan and S.J. Upadhyaya, \u201cPerformance evaluation of rollback-recovery techniques in computer programs,\u201d IEEE Trans. Rel., vol.42, no.2, pp.220-226, 1993. DOI:10.1109\/24.229490 10.1109\/24.229490","DOI":"10.1109\/24.229490"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] T. Dohi, S. Osajima, N. Kaio, and S. Osaki, \u201cOn the effects of checkpoint institution methods for a macroscopic database model,\u201d Electronics and Communications in Japan (Part III: Fundamental Electronic Science), vol.83, no.9, pp.23-33, 2000.","DOI":"10.1002\/(SICI)1520-6440(200009)83:9<23::AID-ECJC3>3.0.CO;2-#"},{"key":"12","doi-asserted-by":"publisher","unstructured":"[12] H. Okamura and T. Dohi, \u201cComprehensive evaluation of aperiodic checkpointing and rejuvenation schemes in operational software system,\u201d Journal of Systems and Software, vol.83, no.9, pp.1591-1604, 2010. DOI:10.1016\/j.jss.2009.06.058 10.1016\/j.jss.2009.06.058","DOI":"10.1016\/j.jss.2009.06.058"},{"key":"13","doi-asserted-by":"publisher","unstructured":"[13] G. Levitin, L. Xing, and L. Luo, \u201cJoint optimal checkpointing and rejuvenation policy for real-time computing tasks,\u201d Reliability Engineering and System Safety, vol.182, pp.63-72, 2019. DOI:10.1016\/j.ress.2018.10.006 10.1016\/j.ress.2018.10.006","DOI":"10.1016\/j.ress.2018.10.006"},{"key":"14","doi-asserted-by":"publisher","unstructured":"[14] J. Zheng, H. Okamura, and T. Dohi, \u201cA phase expansion for non-Markovian availability models with time-based aperiodic rejuvenation and checkpointing,\u201d Communications in Statistics-Theory and Methods, vol.49, no.15, pp.3712-3729, 2020. DOI:10.1080\/ 03610926.2019.1708400 10.1080\/03610926.2019.1708400","DOI":"10.1080\/03610926.2019.1708400"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] G. Bolch, S. Greiner, H. De Meer, and K.S. Trivedi, Queueing Networks and Markov Chains: Modeling and Performance Evaluation with Computer Science Applications, 2nd ed., John Wiley &amp; Sons, New York, NY, USA, 2006. 10.1002\/0471791571","DOI":"10.1002\/0471791571"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] K.S. Trivedi and A. Bobbio, Reliability and Availability Engineering: Modeling, Analysis, and Applications, Cambridge University Press, 2017. 10.1017\/9781316163047","DOI":"10.1017\/9781316163047"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] J. Zheng, H. Okamura, and T. Dohi, \u201cSecurity evaluation of a VM-based intrusion-tolerant system with pull-type patch management,\u201d Proc. 2019 IEEE 19th International Symposium on High Assurance Systems Engineering (HASE&apos;19), IEEE CPS, pp.156-163, 2019. DOI:10.1109\/HASE.2019.00032 10.1109\/hase.2019.00032","DOI":"10.1109\/HASE.2019.00032"},{"key":"18","doi-asserted-by":"publisher","unstructured":"[18] J. Zheng, H. Okamura, and T. Dohi, \u201cA transient interval reliability analysis for software rejuvenation models with phase expansion,\u201d Software Quality Journal, vol.28, pp.173-194, 2020. DOI:10.1007\/s11219-019-09458-1 10.1007\/s11219-019-09458-1","DOI":"10.1007\/s11219-019-09458-1"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] K. Balakrishnan, Exponential Distribution: Theory, Methods and Applications, Routledge, 2018. 10.1201\/9780203756348","DOI":"10.1201\/9780203756348"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] H. Rinne, The Weibull Distribution: A Handbook, CRC press, 2008. 10.1201\/9781420087444","DOI":"10.1201\/9781420087444"},{"key":"21","doi-asserted-by":"publisher","unstructured":"[21] B. Schroeder and G.A. Gibson, \u201cA large-scale study of failures in high-performance computing systems,\u201d IEEE Transactions on Dependable and Secure Computing, vol.7, no.4, pp.337-350, 2010. DOI:10.1109\/TDSC.2009.4 10.1109\/tdsc.2009.4","DOI":"10.1109\/TDSC.2009.4"},{"key":"22","unstructured":"[22] O. Connor, Practical Reliability Engineering, John Wiley &amp; Sons, 2012."},{"key":"23","unstructured":"[23] R. Vinayak and S. Dharmaraja, \u201cSemi-Markov modeling approach for deteriorating systems with preventive maintenance,\u201d International Journal of Performability Engineering, vol.8, no.5, pp.515-526, 2012. DOI:10.23940\/ijpe.12.5.p515.mag"},{"key":"24","unstructured":"[24] K. Wolter, \u201cStochastic models for restart, rejuvenation and checkpointing,\u201d Habilitation Thesis, Humboldt-University, Institut Informatik, Berlin, Tech. Rep., 2008."},{"key":"25","doi-asserted-by":"crossref","unstructured":"[25] H. Okamura and T. Dohi, \u201cFitting phase-type distributions and Markovian arrival processes: algorithms and tools,\u201d Principles of Performance and Reliability Modeling and Evaluation, F. Lance and P. Antonio (eds.), pp.49-75, Springer, 2016. DOI:10.1007\/978-3-319-30599-8_3 10.1007\/978-3-319-30599-8_3","DOI":"10.1007\/978-3-319-30599-8_3"},{"key":"26","doi-asserted-by":"publisher","unstructured":"[26] P. Kemper, D. M\u00fcller, and A. Th\u00fcmmler, \u201cCombining response surface methodology with numerical methods for optimization of Markovian models,\u201d IEEE Transactions on Dependable and Secure Computing, vol.3, no.3, pp.259-269, 2006. DOI:10.1109\/TDSC. 2006.28 10.1109\/tdsc.2006.28","DOI":"10.1109\/TDSC.2006.28"},{"key":"27","doi-asserted-by":"publisher","unstructured":"[27] A. Cumani, \u201cOn the canonical representation of homogeneous Markov processes modelling failure-time distributions,\u201d Microelectronics Reliability, vol.22, no.3, pp.583-602, 1982. DOI:10.1016\/ 0026-2714(82)90033-6 10.1016\/0026-2714(82)90033-6","DOI":"10.1016\/0026-2714(82)90033-6"},{"key":"28","doi-asserted-by":"publisher","unstructured":"[28] H. Okamura, T. Dohi, and K.S. Trivedi, \u201cImprovement of expectation-maximization algorithm for phase-type distributions with grouped and truncated data,\u201d Applied Stochastic Models in Business and Industry, vol.29, no.2, pp.141-156, 2013. DOI:10.1002\/asmb.1919 10.1002\/asmb.1919","DOI":"10.1002\/asmb.1919"},{"key":"29","doi-asserted-by":"crossref","unstructured":"[29] T. Dayar, Analyzing Markov Chains Using Kronecker Products: Theory and Applications, Springer Science &amp; Business Media, 2012. 10.1007\/978-1-4614-4190-8","DOI":"10.1007\/978-1-4614-4190-8"},{"key":"30","unstructured":"[30] K.S. Trivedi, Probability and Statistics with Reliability, Queuing, and Computer Science Applications, 2nd ed., John Wiley &amp; Sons, 2001."},{"key":"31","doi-asserted-by":"publisher","unstructured":"[31] A. Reibman and K.S. Trivedi, \u201cNumerical transient analysis of Markov models,\u201d Computers &amp; Operations Research, vol.15, no.1, pp.19-36, 1988. DOI:10.1016\/0305-0548(88)90026-3 10.1016\/0305-0548(88)90026-3","DOI":"10.1016\/0305-0548(88)90026-3"},{"key":"32","unstructured":"[32] G.H. Sandler, System Reliability Engineering, Prentice-Hall,Englewood Cliffs, New Jersey, 1963."},{"key":"33","doi-asserted-by":"publisher","unstructured":"[33] C.H.C. Leung and E. Currie, \u201cThe effect of failures on the performance of long-duration database transactions,\u201d The Computer Journal, vol.38, no.6, pp.471-478, 1995. DOI:10.1093\/comjnl\/38.6.471 10.1093\/comjnl\/38.6.471","DOI":"10.1093\/comjnl\/38.6.471"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/10\/E103.D_2019EDP7321\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,5]],"date-time":"2021-04-05T05:36:20Z","timestamp":1617600980000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/10\/E103.D_2019EDP7321\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,1]]},"references-count":33,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2019edp7321","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,1]]}}}