{"created":"2025-02-21T03:55:39.722268+00:00","id":2007554,"links":{},"metadata":{"_buckets":{"deposit":"1315b005-12ef-42cd-b9b0-7b0b0a1a675a"},"_deposit":{"created_by":41,"id":"2007554","owners":[41],"pid":{"revision_id":0,"type":"depid","value":"2007554"},"status":"published"},"_oai":{"id":"oai:hiroshima.repo.nii.ac.jp:02007554","sets":["1730444907710"]},"author_link":[],"item_1617186331708":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_title":"Comprehensive evaluation of aperiodic checkpointing and rejuvenation schemes in operational software system","subitem_title_language":"en"}]},"item_1617186419668":{"attribute_name":"Creator","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Okamura, Hiroyuki","creatorNameLang":"en"}],"familyNames":[{"familyName":"Okamura","familyNameLang":"en"}],"givenNames":[{"givenName":"Hiroyuki","givenNameLang":"en"}]},{"creatorNames":[{"creatorName":"Dohi, Tadashi","creatorNameLang":"en"}],"familyNames":[{"familyName":"Dohi","familyNameLang":"en"}],"givenNames":[{"givenName":"Tadashi","givenNameLang":"en"}]}]},"item_1617186476635":{"attribute_name":"Access Rights","attribute_value_mlt":[{"subitem_access_right":"open access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_abf2"}]},"item_1617186499011":{"attribute_name":"Rights","attribute_value_mlt":[{"subitem_rights":"Copyright (c) 2009 Elsevier Inc."}]},"item_1617186609386":{"attribute_name":"Subject","attribute_value_mlt":[{"subitem_subject":"Checkpointing","subitem_subject_scheme":"Other"},{"subitem_subject":"Software rejuvenation","subitem_subject_scheme":"Other"},{"subitem_subject":"Software aging","subitem_subject_scheme":"Other"},{"subitem_subject":"Steady-state system availability","subitem_subject_scheme":"Other"},{"subitem_subject":"Dynamic programming","subitem_subject_scheme":"Other"},{"subitem_subject":"540","subitem_subject_scheme":"NDC"}]},"item_1617186626617":{"attribute_name":"Description","attribute_value_mlt":[{"subitem_description":"This paper examines comprehensive evaluation of aperiodic time-based checkpointing and rejuvenation schemes maximizing the steady-state system availability in an operational software system. We consider two kinds of maintenance policies: checkpointing prior to rejuvenating (CPTR) and rejuvenating prior to checkpointing (RPTC). These schemes are complementary from each other to schedule checkpoints and rejuvenation points. In addition, under a periodic full maintenance operation, we show that aperiodic checkpointing or rejuvenation scheme is optimal to maximize the steady-state system availability by applying the dynamic programming. In numerical examples, CPTR and RPTC are comparatively examined with same overhead parameters, and the effects of CPTR and RPTC on maximizing the steady-state system availability are investigated.","subitem_description_language":"en"}]},"item_1617186643794":{"attribute_name":"Publisher","attribute_value_mlt":[{"subitem_publisher":"Elsevier Science INC"}]},"item_1617186702042":{"attribute_name":"Language","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_1617186920753":{"attribute_name":"Source Identifier","attribute_value_mlt":[{"subitem_source_identifier":"0164-1212","subitem_source_identifier_type":"ISSN"},{"subitem_source_identifier":"AA00259460","subitem_source_identifier_type":"NCID"}]},"item_1617187024783":{"attribute_name":"Page Start","attribute_value_mlt":[{"subitem_start_page":"1591"}]},"item_1617187056579":{"attribute_name":"Bibliographic Information","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2010-09","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"9","bibliographicPageEnd":"1604","bibliographicPageStart":"1591","bibliographicVolumeNumber":"83","bibliographic_titles":[{"bibliographic_title":"Journal of Systems and Software"},{"bibliographic_title":"Journal of Systems and Software"}]}]},"item_1617258105262":{"attribute_name":"Resource Type","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_1617265215918":{"attribute_name":"Version Type","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_b1a7d7d4d402bcce","subitem_version_type":"AO"}]},"item_1617353299429":{"attribute_name":"Relation","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_id_text":"10.1016/j.jss.2009.06.058","subitem_relation_type_select":"DOI"}},{"subitem_relation_type_id":{"subitem_relation_type_id_text":"http://dx.doi.org/10.1016/j.jss.2009.06.058","subitem_relation_type_select":"DOI"}}]},"item_1617605131499":{"attribute_name":"File","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2023-03-18"}],"displaytype":"simple","filename":"JSystSoftware_83_1591.pdf","filesize":[{"value":"295.3 KB"}],"mimetype":"application/pdf","url":{"objectType":"fulltext","url":"https://hiroshima.repo.nii.ac.jp/record/2007554/files/JSystSoftware_83_1591.pdf"},"version_id":"9da5f5e9-99a2-4296-8a4e-a9616bb4c8cb"}]},"item_1732771732025":{"attribute_name":"旧ID","attribute_value":"30410"},"item_title":"Comprehensive evaluation of aperiodic checkpointing and rejuvenation schemes in operational software system","item_type_id":"40003","owner":"41","path":["1730444907710"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2023-03-18"},"publish_date":"2023-03-18","publish_status":"0","recid":"2007554","relation_version_is_last":true,"title":["Comprehensive evaluation of aperiodic checkpointing and rejuvenation schemes in operational software system"],"weko_creator_id":"41","weko_shared_id":-1},"updated":"2025-02-21T10:11:11.878894+00:00"}