期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Availability Importance Measures for Virtualized System with Live Migration 被引量:1
1
作者 Junjun Zheng hiroyuki okamura Tadashi Dohi 《Applied Mathematics》 2015年第2期359-372,共14页
This paper presents component importance analysis for virtualized system with live migration. The component importance analysis is significant to determine the system design of virtualized system from availability and... This paper presents component importance analysis for virtualized system with live migration. The component importance analysis is significant to determine the system design of virtualized system from availability and cost points of view. This paper discusses the importance of components with respect to system availability. Specifically, we introduce two different component importance analyses for hybrid model (fault trees and continuous-time Markov chains) and continuous-time Markov chains, and show the analysis for existing probabilistic models for virtualized system. In numerical examples, we illustrate the quantitative component importance analysis for virtualized system with live migration. 展开更多
关键词 Virtualized SYSTEM LIVE Migration SYSTEM AVAILABILITY Component IMPORTANCE Analysis Fault Tree CONTINUOUS-TIME MARKOV Chain
下载PDF
Quantitative Security Evaluation for Software System from Vulnerability Database
2
作者 hiroyuki okamura Masataka Tokuzane Tadashi Dohi 《Journal of Software Engineering and Applications》 2013年第4期15-23,共9页
This paper proposes a quantitative security evaluation for software system from the vulnerability data consisting of discovery date, solution date and exploit publish date based on a stochastic model. More precisely, ... This paper proposes a quantitative security evaluation for software system from the vulnerability data consisting of discovery date, solution date and exploit publish date based on a stochastic model. More precisely, our model considers a vulnerability life-cycle model and represents the vulnerability discovery process as a non-homogeneous Poisson process. In a numerical example, we show the quantitative measures for contents management system of an open source project. 展开更多
关键词 QUANTITATIVE Security Evaluation VULNERABILITY DATABASE NON-HOMOGENEOUS POISSON Process CONTENTS Management System
下载PDF
Aperiodic Checkpoint Placement Algorithms—Survey and Comparison
3
作者 Shunsuke Hiroyama Tadashi Dohi hiroyuki okamura 《Journal of Software Engineering and Applications》 2013年第4期41-53,共13页
In this article we summarize some aperiodic checkpoint placement algorithms for a software system over infinite and finite operation time horizons, and compare them in terms of computational accuracy. The underlying p... In this article we summarize some aperiodic checkpoint placement algorithms for a software system over infinite and finite operation time horizons, and compare them in terms of computational accuracy. The underlying problem is formulated as the maximization of steady-state system availability and is to determine the optimal aperiodic checkpoint sequence. We present two exact computation algorithms in both forward and backward manners and two approximate ones;constant hazard approximation and fluid approximation, toward this end. In numerical examples with Weibull system failure time distribution, it is shown that the combined algorithm with the fluid approximation can calculate effectively the exact solutions on the optimal aperiodic checkpoint sequence. 展开更多
关键词 CHECKPOINT PLACEMENT Aperiodic Policy AVAILABILITY Models COMPUTATION ALGORITHMS COMPARISON
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部