Methods and opportunities for rejuvenation in aging distributed software systems
In this paper we describe several methods for detecting the need for software rejuvenation in mission critical systems that are subjected to worm infection, and introduce new software rejuvenation algorithms. We evaluate these algorithms’ effectiveness using both simulation studies and analytic mode...
Saved in:
| Published in: | The Journal of systems and software Vol. 83; no. 9; pp. 1568 - 1578 |
|---|---|
| Main Authors: | , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
New York
Elsevier Inc
01.09.2010
Elsevier Sequoia S.A |
| Subjects: | |
| ISSN: | 0164-1212, 1873-1228 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | In this paper we describe several methods for detecting the need for software rejuvenation in mission critical systems that are subjected to worm infection, and introduce new software rejuvenation algorithms. We evaluate these algorithms’ effectiveness using both simulation studies and analytic modeling, by assessing the probability of mission success. The system under study emulates a Mobile Ad-Hoc Network (MANET) of processing nodes. Our analysis determined that some of our rejuvenation algorithms are quite effective in maintaining a high probability of mission success while the system is under explicit attack by a worm infection. |
|---|---|
| AbstractList | In this paper we describe several methods for detecting the need for software rejuvenation in mission critical systems that are subjected to worm infection, and introduce new software rejuvenation algorithms. We evaluate these algorithms’ effectiveness using both simulation studies and analytic modeling, by assessing the probability of mission success. The system under study emulates a Mobile Ad-Hoc Network (MANET) of processing nodes. Our analysis determined that some of our rejuvenation algorithms are quite effective in maintaining a high probability of mission success while the system is under explicit attack by a worm infection. In this paper we describe several methods for detecting the need for software rejuvenation in mission critical systems that are subjected to worm infection, and introduce new software rejuvenation algorithms. We evaluate these algorithms' effectiveness using both simulation studies and analytic modeling, by assessing the probability of mission success. The system under study emulates a Mobile Ad-Hoc Network (MANET) of processing nodes. Our analysis determined that some of our rejuvenation algorithms are quite effective in maintaining a high probability of mission success while the system is under explicit attack by a worm infection. [PUBLICATION ABSTRACT] |
| Author | Weyuker, Elaine J. Cole, Robert G. Avritzer, Alberto |
| Author_xml | – sequence: 1 givenname: Alberto surname: Avritzer fullname: Avritzer, Alberto email: alberto.avritzer@siemens.com organization: Siemens Corporate Research, 755 College Road East, Princeton, NJ 08540, United States – sequence: 2 givenname: Robert G. surname: Cole fullname: Cole, Robert G. email: robert.cole@jhuapl.edu organization: The JHU/Applied Physics Laboratory, 12000 Johns Hopkins Road, Laurel, Maryland 20723, United States – sequence: 3 givenname: Elaine J. surname: Weyuker fullname: Weyuker, Elaine J. email: weyuker@research.att.com organization: AT & T Labs – Research, 180 Park Avenue, Florham Park, NJ 07932, United States |
| BookMark | eNp9kMtuGyEUQFHlSnXcfkB3KKts7PCal7KKrKSN5CpZtGvEwB2XkQ0Ol0nlvy-uu8rCK0A65-pyrsgsxACEfOVsxRmvb8fViLgSrLxZtWKi_kDmvG3kkgvRzsi8MKrcufhErhBHxlgjmJiTlx-Qf0eH1ARH4-EQU56Czx6QDjHRBOP0BsFkHwP1gZqtD1vqPObk-ymDoxiH_MckoHjEDHv8TD4OZofw5f-5IL8eH36uvy83z9-e1vebpZVVk5eyZdINvXBKVaaC1vFBdH3TQWeavuN171o3tF1vlTKmtoyDU3ZQzklXd7zlckFuznMPKb5OgFnvPVrY7UyAOKHmoq4bJWvVFvT6HTrGKYWynW6kZFzI7gQ1Z8imiJhg0Nbnf__Oyfid5kyfQutRl9D6FFqzSpfQxeTvzEPye5OOF527swMl0ZuHpNF6CBacT2CzdtFfsP8CFpuZwQ |
| CODEN | JSSODM |
| CitedBy_id | crossref_primary_10_1007_s11219_019_09464_3 crossref_primary_10_1587_transinf_E96_D_1933 crossref_primary_10_1007_s11219_025_09710_x crossref_primary_10_1016_j_ress_2014_09_007 crossref_primary_10_1109_ACCESS_2020_2983652 crossref_primary_10_1007_s40010_016_0273_1 |
| Cites_doi | 10.1147/rd.452.0311 10.1023/A:1009794200077 10.1007/978-1-4757-6217-4 10.1016/j.jss.2006.07.020 10.1016/S0166-5316(01)00037-2 |
| ContentType | Journal Article |
| Copyright | 2010 Elsevier Inc. Copyright Elsevier Sequoia S.A. Sep 2010 |
| Copyright_xml | – notice: 2010 Elsevier Inc. – notice: Copyright Elsevier Sequoia S.A. Sep 2010 |
| DBID | AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
| DOI | 10.1016/j.jss.2010.05.026 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Computer and Information Systems Abstracts Computer and Information Systems Abstracts |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1873-1228 |
| EndPage | 1578 |
| ExternalDocumentID | 2093693611 10_1016_j_jss_2010_05_026 S0164121210001093 |
| Genre | Feature |
| GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1~. 1~5 29L 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN 9M8 AABNK AACTN AAEDT AAEDW AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN AAYOK ABBOA ABEFU ABFNM ABFRF ABFSI ABJNI ABMAC ABTAH ABXDB ABYKQ ACDAQ ACGFO ACGFS ACGOD ACNNM ACRLP ACZNC ADBBV ADEZE ADHUB ADJOM ADMUD AEBSH AEFWE AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AI. AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BKOJK BKOMP BLXMC CS3 DU5 E.L EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q G8K GBLVA GBOLZ HLZ HVGLF HZ~ IHE J1W KOM LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RIG RNS ROL RPZ RXW SBC SDF SDG SDP SES SEW SPC SPCBC SSV SSZ T5K TAE TN5 TWZ UHS UNMZH VH1 WUQ XPP ZMT ZY4 ~G- 9DU AATTM AAXKI AAYWO AAYXX ABDPE ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD 7SC 8FD AFXIZ AGCQF AGRNS JQ2 L7M L~C L~D SSH |
| ID | FETCH-LOGICAL-c357t-3803dfb2d445a5e8d1f29b79e9a7b916bd8df89bc44aa6c01ed4cf4dd3d691813 |
| ISICitedReferencesCount | 12 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000280928000004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0164-1212 |
| IngestDate | Sat Sep 27 21:03:00 EDT 2025 Fri Jul 25 03:12:10 EDT 2025 Sat Nov 29 05:52:15 EST 2025 Tue Nov 18 21:36:35 EST 2025 Fri Feb 23 02:32:34 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 9 |
| Keywords | Software dependability Software aging and rejuvenation |
| Language | English |
| License | https://www.elsevier.com/tdm/userlicense/1.0 |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c357t-3803dfb2d445a5e8d1f29b79e9a7b916bd8df89bc44aa6c01ed4cf4dd3d691813 |
| Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-2 content type line 23 |
| PQID | 733012398 |
| PQPubID | 45802 |
| PageCount | 11 |
| ParticipantIDs | proquest_miscellaneous_1266743648 proquest_journals_733012398 crossref_citationtrail_10_1016_j_jss_2010_05_026 crossref_primary_10_1016_j_jss_2010_05_026 elsevier_sciencedirect_doi_10_1016_j_jss_2010_05_026 |
| PublicationCentury | 2000 |
| PublicationDate | 2010-09-01 |
| PublicationDateYYYYMMDD | 2010-09-01 |
| PublicationDate_xml | – month: 09 year: 2010 text: 2010-09-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | The Journal of systems and software |
| PublicationYear | 2010 |
| Publisher | Elsevier Inc Elsevier Sequoia S.A |
| Publisher_xml | – name: Elsevier Inc – name: Elsevier Sequoia S.A |
| References | Avritzer, A., Cole, R.G., Weyuker, E.J. 2007. Using performance signatures and software rejuvenation for worm mitigation in tactical MANETs. In: ACM Workshop on Software and Performance, pp. 172–180. Dohi, T., Goševa-Popstojanova, K., Trivedi, K.S. 2000. Statistical non-parametric algorithms to estimate the optimal software rejuvenation schedule. In Proceedings of the International Pacific Rim Symposium on Dependable Computing, pp. 77–84. Avritzer, Weyuker (bib2) 2002 Avritzer, A., Bondi, A., Weyuker, E.J. 2005. Ensuring stable performance for systems that degrade. In Proceedings of the Fifth International Workshop on Software and Performance, pp. 43–51. Dohi, T., Goševa-Popstojanova, K., Trivedi, K.S. 2000. Analysis of software cost models with rejuvenation. In: Proceedings of the IEEE International Symposium on High Assurance Systems Engineering, HASE-2000. Jia, Y-F., Zhao, L., Cai, K-Y. 2008. A nonlinear approach to modeling of software aging in a web server. In: 15th Asia-Pacific Software Engineering Conference, pp. 77–84. Avritzer, Bondi, Weyuker (bib4) 2007; 80 Grottke, Trivedi (bib14) 2005; 27 Cooper (bib8) 1998 Hong, Y., Chen, D., Li, L., Trivedi, K.S. 2002. Closed loop design for software rejuvenation. In: Proceedings of Workshop Self-Healing, Adaptive and Self-Managed Systems, SHAMAN. Huang, Y., Kintala, C., Kolettis, N., Fulton, N. 1995. Software rejuvenation: analysis, module and applications. In Proceedings of Twenty-fifth International Symposium on Fault-Tolerant Computing, pp. 381–390. Trivedi, K.S., Vaidyanathan, K., Goševa-Popstojanova, K. 2000. Modeling and analysis of software aging and rejuvenation. In: IEEE Annual Simulation Symposium, pp. 270–279. Avritzer, Weyuker (bib1) 1997; 2 Bobbio, Sereno, Anglano (bib6) 2001; 46 Castelli, Harper, Heidelberger, Hunter, Trivedi, Vaidyanathan, Zeggert (bib7) 2001; 45 Rajamony, R., Elnozahy, M. 2001. Measuring client-perceived response times on the WWW. In: Proceedings of Third USENIX Symposium on Internet Technologies and Systems. Garg, S., Huang, Y., Kintala, C., Trivedi, K.S. 1996. Minimizing completion time of a program by checkpointing and rejuvenation, In Proceedings of the 1996 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, pp. 252–261. Garg, S., Puliafito, A., Telek, M., Trivedi, K.S. 1995. Analysis of software rejuvenation using Markov regenerative stochastic Petri net. In Proceedings of the Sixth International Symposium on Software Reliability Engineering, pp. 24–27. Graybill, Melhem (bib13) 2002 Avritzer (10.1016/j.jss.2010.05.026_bib2) 2002 Avritzer (10.1016/j.jss.2010.05.026_bib4) 2007; 80 10.1016/j.jss.2010.05.026_bib3 10.1016/j.jss.2010.05.026_bib5 Cooper (10.1016/j.jss.2010.05.026_bib8) 1998 10.1016/j.jss.2010.05.026_bib10 Bobbio (10.1016/j.jss.2010.05.026_bib6) 2001; 46 10.1016/j.jss.2010.05.026_bib9 10.1016/j.jss.2010.05.026_bib11 10.1016/j.jss.2010.05.026_bib12 Graybill (10.1016/j.jss.2010.05.026_bib13) 2002 10.1016/j.jss.2010.05.026_bib15 Avritzer (10.1016/j.jss.2010.05.026_bib1) 1997; 2 Castelli (10.1016/j.jss.2010.05.026_bib7) 2001; 45 10.1016/j.jss.2010.05.026_bib16 10.1016/j.jss.2010.05.026_bib17 10.1016/j.jss.2010.05.026_bib18 10.1016/j.jss.2010.05.026_bib19 Grottke (10.1016/j.jss.2010.05.026_bib14) 2005; 27 |
| References_xml | – volume: 27 start-page: 425 year: 2005 end-page: 438 ident: bib14 article-title: Software faults, software aging and software rejuvenation publication-title: Journal of the Reliability Engineering Association of Japan – reference: Dohi, T., Goševa-Popstojanova, K., Trivedi, K.S. 2000. Analysis of software cost models with rejuvenation. In: Proceedings of the IEEE International Symposium on High Assurance Systems Engineering, HASE-2000. – volume: 2 start-page: 59 year: 1997 end-page: 77 ident: bib1 article-title: Monitoring smoothly degrading systems for increased dependability publication-title: Empirical Software Engineering – reference: Avritzer, A., Bondi, A., Weyuker, E.J. 2005. Ensuring stable performance for systems that degrade. In Proceedings of the Fifth International Workshop on Software and Performance, pp. 43–51. – volume: 80 start-page: 441 year: 2007 end-page: 454 ident: bib4 article-title: Ensuring system performance for cluster and single server systems publication-title: Journal of Systems and Software – reference: Garg, S., Huang, Y., Kintala, C., Trivedi, K.S. 1996. Minimizing completion time of a program by checkpointing and rejuvenation, In Proceedings of the 1996 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, pp. 252–261. – reference: Trivedi, K.S., Vaidyanathan, K., Goševa-Popstojanova, K. 2000. Modeling and analysis of software aging and rejuvenation. In: IEEE Annual Simulation Symposium, pp. 270–279. – reference: Dohi, T., Goševa-Popstojanova, K., Trivedi, K.S. 2000. Statistical non-parametric algorithms to estimate the optimal software rejuvenation schedule. In Proceedings of the International Pacific Rim Symposium on Dependable Computing, pp. 77–84. – reference: Hong, Y., Chen, D., Li, L., Trivedi, K.S. 2002. Closed loop design for software rejuvenation. In: Proceedings of Workshop Self-Healing, Adaptive and Self-Managed Systems, SHAMAN. – volume: 45 start-page: 311 year: 2001 end-page: 332 ident: bib7 article-title: Proactive management of software aging publication-title: IBM Journal of Research and Development – reference: Avritzer, A., Cole, R.G., Weyuker, E.J. 2007. Using performance signatures and software rejuvenation for worm mitigation in tactical MANETs. In: ACM Workshop on Software and Performance, pp. 172–180. – reference: Rajamony, R., Elnozahy, M. 2001. Measuring client-perceived response times on the WWW. In: Proceedings of Third USENIX Symposium on Internet Technologies and Systems. – start-page: 45 year: 2002 end-page: 54 ident: bib2 article-title: A metric for predicting the performance of an application under a growing workload publication-title: IBM Systems Journal – year: 2002 ident: bib13 article-title: Power Aware Computing Series in Computer Science – reference: Jia, Y-F., Zhao, L., Cai, K-Y. 2008. A nonlinear approach to modeling of software aging in a web server. In: 15th Asia-Pacific Software Engineering Conference, pp. 77–84. – reference: Garg, S., Puliafito, A., Telek, M., Trivedi, K.S. 1995. Analysis of software rejuvenation using Markov regenerative stochastic Petri net. In Proceedings of the Sixth International Symposium on Software Reliability Engineering, pp. 24–27. – reference: Huang, Y., Kintala, C., Kolettis, N., Fulton, N. 1995. Software rejuvenation: analysis, module and applications. In Proceedings of Twenty-fifth International Symposium on Fault-Tolerant Computing, pp. 381–390. – volume: 46 start-page: 45 year: 2001 end-page: 62 ident: bib6 article-title: Fine grained software degradation models for optimal rejuvenation policies publication-title: Performance Evaluation – year: 1998 ident: bib8 article-title: Fundamentals of Queuing Theory – volume: 45 start-page: 311 issue: 2 year: 2001 ident: 10.1016/j.jss.2010.05.026_bib7 article-title: Proactive management of software aging publication-title: IBM Journal of Research and Development doi: 10.1147/rd.452.0311 – ident: 10.1016/j.jss.2010.05.026_bib17 – ident: 10.1016/j.jss.2010.05.026_bib18 – start-page: 45 year: 2002 ident: 10.1016/j.jss.2010.05.026_bib2 article-title: A metric for predicting the performance of an application under a growing workload publication-title: IBM Systems Journal – ident: 10.1016/j.jss.2010.05.026_bib19 – ident: 10.1016/j.jss.2010.05.026_bib15 – volume: 2 start-page: 59 issue: 1 year: 1997 ident: 10.1016/j.jss.2010.05.026_bib1 article-title: Monitoring smoothly degrading systems for increased dependability publication-title: Empirical Software Engineering doi: 10.1023/A:1009794200077 – ident: 10.1016/j.jss.2010.05.026_bib10 – ident: 10.1016/j.jss.2010.05.026_bib11 – ident: 10.1016/j.jss.2010.05.026_bib16 – ident: 10.1016/j.jss.2010.05.026_bib12 – year: 2002 ident: 10.1016/j.jss.2010.05.026_bib13 doi: 10.1007/978-1-4757-6217-4 – year: 1998 ident: 10.1016/j.jss.2010.05.026_bib8 – volume: 80 start-page: 441 issue: 4 year: 2007 ident: 10.1016/j.jss.2010.05.026_bib4 article-title: Ensuring system performance for cluster and single server systems publication-title: Journal of Systems and Software doi: 10.1016/j.jss.2006.07.020 – volume: 46 start-page: 45 issue: 1 year: 2001 ident: 10.1016/j.jss.2010.05.026_bib6 article-title: Fine grained software degradation models for optimal rejuvenation policies publication-title: Performance Evaluation doi: 10.1016/S0166-5316(01)00037-2 – ident: 10.1016/j.jss.2010.05.026_bib5 – ident: 10.1016/j.jss.2010.05.026_bib3 – volume: 27 start-page: 425 issue: 7 year: 2005 ident: 10.1016/j.jss.2010.05.026_bib14 article-title: Software faults, software aging and software rejuvenation publication-title: Journal of the Reliability Engineering Association of Japan – ident: 10.1016/j.jss.2010.05.026_bib9 |
| SSID | ssj0007202 |
| Score | 1.9932723 |
| Snippet | In this paper we describe several methods for detecting the need for software rejuvenation in mission critical systems that are subjected to worm infection,... |
| SourceID | proquest crossref elsevier |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1568 |
| SubjectTerms | Algorithms Computer programs Computer simulation Computer viruses Cybersecurity Distributed processing Mathematical analysis Mathematical models Missions Simulation Software Software aging and rejuvenation Software dependability Software reliability Studies Worms |
| Title | Methods and opportunities for rejuvenation in aging distributed software systems |
| URI | https://dx.doi.org/10.1016/j.jss.2010.05.026 https://www.proquest.com/docview/733012398 https://www.proquest.com/docview/1266743648 |
| Volume | 83 |
| WOSCitedRecordID | wos000280928000004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1873-1228 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0007202 issn: 0164-1212 databaseCode: AIEXJ dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3Pb9MwFLbKxoELv9HGABmJE1OqNE5i-1ihTjCVMmkd9GYlsSO1qpKuSbqNv4k_kufYSbNpVHDgElV2HCV-X58_28_vQ-iD66b6QGPspCHMdHwYUh2ehASwTJUbxYTFtYrC9zGdTNhsxs96vV_NWZjNkmYZu77mq_9qaigDY-ujs_9g7vahUAC_wehwBbPD9a8M_7XWhDapl_OVptdVVqdNrSMK12pRgX-LmhhHI1IkdfpcrXyl9Cp6Wl7peLCik8x8sQVVh8LaO47N4rtp1iJos56XP61Wtk6kVebtfkduYphNVPdW3euHuqlskMdoGWn6e9pdlND76by7KNGeljlXl1U-j47P-8PuImaocyXa8GllHC-jBMrsQXHrmY3EjUUg77hZmHSye_2_WYpY9BdFYcP2gr7r3ZNre_JNnFyMx2I6mk1v19Zju-dqoUMSwkCwunS0Rpney7eCLQ_QvkcDDj50f_hlNDttR37q1TGu7fc1u-h1POGdV_oTD7rDCGqaM32KHlvj4qHB1TPUU9lz9KTR_sB2KHiBzizMMNge34IZBpjhLszwPMM1zHAHZrjBC7YgeokuTkbTT58dq87hJCSgpUOYS2Qae9L3gyhQTA5Sj8eUKx7RGCYdsWQyZTxOfD-KwsQdKOknqS8lkSEHXkleob0sz9QBwgNFfEIZoVCnCW1MpIwD4ntRGEfEZYfIbfpKJDZ1vVZQWYomRnEhoHuF7l7hBgK69xB9bJusTN6WXTf7jQGEJZ6GUArA1a5mR42xhHUAhaCE6GkKh5d-39aCy9b7cFGm8qoQAyDFQNxDn73e-YQj9Gj733qD9sp1pd6ih8mmnBfrdxZ8vwEHdrmp |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Methods+and+opportunities+for+rejuvenation+in+aging+distributed+software+systems&rft.jtitle=The+Journal+of+systems+and+software&rft.au=Avritzer%2C+Alberto&rft.au=Cole%2C+Robert+G&rft.au=Weyuker%2C+Elaine+J&rft.date=2010-09-01&rft.pub=Elsevier+Sequoia+S.A&rft.issn=0164-1212&rft.eissn=1873-1228&rft.volume=83&rft.issue=9&rft.spage=1568&rft_id=info:doi/10.1016%2Fj.jss.2010.05.026&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=2093693611 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0164-1212&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0164-1212&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0164-1212&client=summon |