{"id":"https://openalex.org/W2161499467","doi":"https://doi.org/10.1109/icac.2006.1662388","title":"System's Availability Maximization Through Preventive Rejuvenation","display_name":"System's Availability Maximization Through Preventive Rejuvenation","publication_year":2006,"publication_date":"2006-08-08","ids":{"openalex":"https://openalex.org/W2161499467","doi":"https://doi.org/10.1109/icac.2006.1662388","mag":"2161499467"},"language":"en","primary_location":{"id":"doi:10.1109/icac.2006.1662388","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icac.2006.1662388","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2006 IEEE International Conference on Autonomic Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028979219","display_name":"Y. Langer","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Y. Langer","raw_affiliation_strings":["Sun Microsystems, USA"],"affiliations":[{"raw_affiliation_string":"Sun Microsystems, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041490715","display_name":"Aleksey Urmanov","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"A. Urmanov","raw_affiliation_strings":["Sun Microsystems, USA"],"affiliations":[{"raw_affiliation_string":"Sun Microsystems, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5028979219"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.4111,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.85250241,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"107","last_page":"113"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10780","display_name":"Reliability and Maintenance Optimization","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10780","display_name":"Reliability and Maintenance Optimization","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11357","display_name":"Risk and Safety Analysis","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1804","display_name":"Statistics, Probability and Uncertainty"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/preventive-maintenance","display_name":"Preventive maintenance","score":0.8866277933120728},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6785044074058533},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.5886808633804321},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5189692378044128},{"id":"https://openalex.org/keywords/maximization","display_name":"Maximization","score":0.5023021697998047},{"id":"https://openalex.org/keywords/adaptation","display_name":"Adaptation (eye)","score":0.4354499280452728},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.37733587622642517},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.37462490797042847},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.21345114707946777},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16923579573631287},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.12191247940063477}],"concepts":[{"id":"https://openalex.org/C24090081","wikidata":"https://www.wikidata.org/wiki/Q1043452","display_name":"Preventive maintenance","level":2,"score":0.8866277933120728},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6785044074058533},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.5886808633804321},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5189692378044128},{"id":"https://openalex.org/C2776330181","wikidata":"https://www.wikidata.org/wiki/Q18358244","display_name":"Maximization","level":2,"score":0.5023021697998047},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.4354499280452728},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.37733587622642517},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.37462490797042847},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.21345114707946777},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16923579573631287},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.12191247940063477},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icac.2006.1662388","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icac.2006.1662388","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2006 IEEE International Conference on Autonomic Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W38046574","https://openalex.org/W1596182111","https://openalex.org/W1964607263","https://openalex.org/W2006273319","https://openalex.org/W2091966857","https://openalex.org/W2096269302","https://openalex.org/W2109192777","https://openalex.org/W2131724406","https://openalex.org/W2156138095","https://openalex.org/W2162951495","https://openalex.org/W2168755708","https://openalex.org/W2592626502","https://openalex.org/W3145241921","https://openalex.org/W4229663176","https://openalex.org/W6601565062"],"related_works":["https://openalex.org/W4214827973","https://openalex.org/W2315243270","https://openalex.org/W4231557335","https://openalex.org/W2394158014","https://openalex.org/W2370623581","https://openalex.org/W2065422689","https://openalex.org/W2130432129","https://openalex.org/W2552440346","https://openalex.org/W2890184129","https://openalex.org/W1978071414"],"abstract_inverted_index":{"Preventive":[0],"system":[1,73,86,91,100,108,113],"maintenance":[2,26,47],"is":[3,101,126,132],"one":[4],"of":[5,14,34,57,84,106,163,175,190,192,200],"the":[6,11,31,81,85,107,112,123,137,142,147,164,173,176,193],"important":[7],"measures":[8],"to":[9,79,117,197],"assure":[10],"key":[12],"elements":[13],"autonomic":[15],"computing":[16],"such":[17],"as":[18,103],"adaptation,":[19],"healing":[20],"and":[21,63,69,87,180,185],"protection.":[22],"However,":[23],"existing":[24,58],"preventive":[25,46,50,119,194],"methods":[27],"do":[28],"not":[29],"meet":[30],"necessary":[32],"requirements":[33,179],"their":[35],"application":[36,191],"into":[37],"practice.":[38],"In":[39],"this":[40,155],"paper,":[41],"we":[42,157],"propose":[43],"a":[44,98,104,168,201],"new":[45],"approach,":[48],"termed":[49],"rejuvenation,":[51],"that":[52,122],"makes":[53],"up":[54],"some":[55],"deficiencies":[56],"methods.":[59],"System's":[60],"physical":[61],"parameters":[62],"software":[64],"metrics":[65],"are":[66,77,187,204],"continuously":[67],"collected":[68],"processed":[70],"using":[71],"continuous":[72],"telemetry.":[74],"These":[75],"data":[76,166,183],"used":[78],"estimate":[80],"current":[82],"state":[83],"its":[88],"components":[89,199],"during":[90],"operation.":[92],"The":[93,134],"optimal":[94,149],"rejuvenation":[95,150,195],"rule":[96],"for":[97,161,167,182],"degrading":[99],"formulated":[102],"subset":[105],"states":[109],"in":[110,136],"which":[111,139],"should":[114],"be":[115],"subjected":[116],"certain":[118],"actions":[120],"so":[121],"system's":[124],"availability":[125],"maximized":[127],"(or":[128],"other":[129],"specific":[130],"goal":[131],"achieved).":[133],"uncertainty":[135],"data,":[138],"originates":[140],"from":[141],"experimental":[143],"measurements,":[144],"may":[145],"invalidate":[146],"obtained":[148,165],"rule.":[151],"To":[152],"deal":[153],"with":[154],"uncertainty,":[156],"derived":[158,177],"acceptable":[159],"bounds":[160],"variations":[162],"given":[169],"confidence":[170],"level.":[171],"On":[172],"basis":[174],"bounds,":[178],"rules":[181],"gathering":[184],"processing":[186],"generated.":[188],"Examples":[189],"approach":[196],"various":[198],"computer":[202],"server":[203],"demonstrated.":[205]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
