• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Neuralnetwork based approach for time to crash prediction to cope with software aging

    2015-12-23 10:09:17,3,*,3

    ,3,*,3

    1.Schoolof Computer Science,Institute for Research in Fundamental Sciences(IPM),Tehran 19395-5746,Iran; 2.Institute of Advanced Studies on Cybersecurity,University of Leon,Leon 24005,Spain; 3.Departmentof Computer Engineering,Iran University of Technology,Tehran 1684613114,Iran

    Neuralnetwork based approach for time to crash prediction to cope with software aging

    Moona Yakhchi1,Javier Alonso2,MahdiFazeli1,3,*,Amir Akhavan Bitaraf1,Ahmad Patooghy1,3

    1.Schoolof Computer Science,Institute for Research in Fundamental Sciences(IPM),Tehran 19395-5746,Iran; 2.Institute of Advanced Studies on Cybersecurity,University of Leon,Leon 24005,Spain; 3.Departmentof Computer Engineering,Iran University of Technology,Tehran 1684613114,Iran

    Recent studies have shown that software is one of the main reasons for computer systems unavailability.A growing accumulation of software errors with time causes a phenomenon called software aging.This phenomenon can resultin system performance degradation and eventually system hang/crash.To cope with software aging,software rejuvenation has been proposed. Software rejuvenation is a proactive technique which leads to removing the accumulated software errors by stopping the system, cleaning up its internal state,and resuming its normal operation. One of the main challenges of software rejuvenation is accurately predicting the time to crash due to aging factors such as memory leaks.In this paper,different machine learning techniques are compared to accurately predict the software time to crash under different aging scenarios.Finally,by comparing the accuracy ofdifferenttechniques,it can be concluded thatthe multilayer perceptron neuralnetwork has the highestprediction accuracy among alltechniques studied.

    software reliability,software rejuvenation,machine learning.

    1.Introduction

    Ever-increasing use of computer systems in human life requires high levels of reliability and availability of such systems.Computer systems have a variety of applications ranging from safety critical applications such as medical, industrial,and military systems to non-criticalapplications such as e-commerce websites or consumer electronic devices.

    The complexity of today’s computer systems has severely challenged the availability of such systems.Availability has been regarded as an important issue in safety criticalapplications;however,ithas also become a serious concern in today’s non-safety critical applications due to the increasing societal dependency on IT systems.Moreover,IT system failures have importantpro fi tcostand also erode the company’s reputation and negatively impact its future marketshare[1].

    The underlying causes of system failures can be classifi ed into software errors,hardware errors and human errors.Software errors are becoming the main reason of the system failures due to their growing complexity.The software aging phenomenon causes a non-negligible fraction of system failures.Software aging was introduced in[2]. It is de fi ned as an accumulation of software errors with time,which can resultin resource exhaustion,performance degradation,and eventually system crash.Software aging is caused by aging-related bugs(ARBs)[3].Some examples of the effects of ARBs are memory leakage[4],memory fragmentation[4],unterminated threads[5],or data expiration[2,5].

    The software aging phenomenon may lead to system crash.Hence itis ofdecisive importance to cope with software aging effects.As a counter measure of software aging,software rejuvenation was proposed[2].Software rejuvenation is a proactive approach in contrast with traditional reactive approaches to deal with software failures, which removes the aging effects by stopping the aging system,cleaning its internalstate and resuming its operation. This would prevent or mitigate the performance degradation,and even itcan avoid or delay software crash.

    Software rejuvenation is classi fi ed into two main categories based on how the rejuvenation is triggered(See Fig.1,adapted from[3]):time-based and inspectionbased approaches.In the time-based approach,the rejuvenation activation is triggered at regular time intervals[5]. Inspection-based approaches monitorthe system state and, when itcrosses certain pre-speci fi ed limit,the rejuvenation is activated.The inspection-based approach is sub-dividedinto three approaches:threshold-based,prediction-based, and mixed approaches.In threshold-based approaches,the activation threshold is pre fi xed based on the experience or human expertise[6].In prediction-based approaches,a prediction mechanism(e.g.,machine learning and statistical approaches)is used to estimate the time to crash(or time to resource exhaustion)[7,8].Based on the predicted measure the rejuvenation is triggered when the crash is imminent.Therefore,in this approach a predictive function is required.In mixed approaches,it is a combination of threshold-based and prediction-based approaches together [9].

    Fig.1 Software rejuvenation scheduling strategies

    According to[10],prediction approaches are gaining attention from industry and academia as a future mechanism to implement software rejuvenation.In order to develop the prediction-based software rejuvenation mechanism,it requires a highly accurate prediction function.Thus,prediction approaches mustbe able to predict,with high accuracy,the time to crash or time to resource exhaustion due to software aging effects.This willallow triggering the rejuvenation only when it is strictly necessary according to the system state.

    Prediction-based approaches which require a prediction function according to the current/past state of the system will predict the future system state.Previous papers have compared the prediction accuracy of different machine learning algorithms to predictthe state of the system under the effectof software[7,8,11-13].

    However,due to the vast number of machine learning algorithms,there are still differentmachine learning algorithms not analyzed.In this paper,we present an experimental comparison of multilayer perceptron neural network(MPNN)[14]with the best candidates revealed in previous papers.MPNN is compared with some ofthe best well-known machine learning algorithms and some of the bestcandidates revealed in the previous papers[12,13].

    We rank the algorithms according to theircorrelation coef fi cients,mean absolute error(MAE),root mean squared error(RMSE)and relative absolute error(RAE).We compare the algorithms under four different software aging scenarios.The results reveal that MPNN is the best candidate according to allmetrics of interest.

    The rest of the paper is organized as follows.Section 2 presents the related work.Section 3 describes the experimental environment.Section 4 brie fl y introduces the machine learning algorithms compared in our experimental study.Section 5 discusses the obtained results and fi nally Section 6 concludes the paper.

    2.Related work

    Huang et al.[2]introduced software rejuvenation as a proactive countermeasure of software aging.As ithas been aforementioned,software rejuvenation is classi fi ed according to how the rejuvenation is scheduled as time-based or inspection-based strategies.Time-based approaches focus on trying to estimate the mostsuitable time intervalto triggerthe rejuvenation[5].However,time-based rejuvenation strategies do not usually take into accountthe state of the system under monitoring,and thus,it is possible thatthey trigger unnecessary rejuvenation actions.In order to fi ll this gap,inspection-based approaches have been proposed. Inspection-based approaches are characterized by monitoring the state ofthe system(i.e.,monitoring memory usage, CPU usage,orother resources)and determining if the system is aged.If it is the case,the rejuvenation is triggered. The mechanism to determine the aging of the system subdivides inspection-based approaches into threshold-based approaches and prediction-based approaches.The former approaches de fi ne a threshold for the aging factor(e.g., memory usage),when the threshold is reached the rejuvenation is triggered[6,15].These strategies have important limitations since they require knowing the aging factor(s) in advance,which is notalways possible.Furthermore,the threshold becomes a key factor for the availability of thesystem.If the threshold is notaccurately fi xed,the system can crash or offer an unacceptable performance before the rejuvenation is triggered.

    Several papers have presented different mechanisms to predict/estimate the time to crash or time to resource exhaustion,using statistical or machine learning techniques [7,8,12,13,16,17].These techniques use historical system state metrics easily collected in any system to estimate the time to crash or to resource exhaustion.Some examples of these system state metrics are throughput,response time, CPU usage,memory consumed by the system ora speci fi c application,numberofthreads,or numberof TCP connections.

    In[16]Sens’s slope statisticaltechnique is used to estimate the resource exhaustion trend.Sen’s slope statistical technique is also able to estimate this trend in presence of seasonal behavioral data.Once they obtain the aging trend,the time series approach is used to estimate the time to resource exhaustion.In[18],the authors compare the Mann-Kendall trend and Sen’s slope approaches with the Hodrick-Prescott fi lter and the multi-scale Mann-Whitney U test.The results show that the Hodrick-Prescott fi lter and the multi-scale Mann-Whiteney test improve the accuracy of Sen’s slope and Mann-Kendall,offering a unifi ed structure without requiring a previous seasonal test. Furthermore,the proposal approach is able to distinguish between abruptchanges and aging degradation.

    Time series autoregressive moving average(ARMA) models are used in[17]to estimate the resource exhaustion time.This paper recognizes the relationship between the aging trend and the workload.However,all aforementioned papers assume thatthe aging factor is known in advance.

    There also are a set of papers where different machine learning algorithms have been compared each other under differentaging scenarios.In[13],the authors compare Na¨?ve Bayes,decision trees and support vector machine algorithms to predict time to crash due to aging.However,the considered aging is constant along the time.In [7]and[12],the authors compared linear regression,decision trees and a mixed algorithm called M5P under different dynamic and complex scenarios.These papers consider scenarios where the aging trend changes along the time with and without dependency of the workload.The study revealed that M5P was a good candidate to predict the time to crash under different scenarios and different/combined aging factors(i.e.,memory and threads).

    The main goal of any of the software aging prediction approaches is to decide if the system requires rejuvenation.Thus,itis only required to know the state of the system.Following this idea,differentclassi fi cation algorithms were compared in[12]underthe same scenarios presented in[7].Random forest was determined as the best candidate.

    In this paper,we are interested in extending the number of machine learning algorithms analyzed to modelthe aging phenomena under different aging scenarios.This will provide more information to practitioners and researchers about which the machine learning algorithm will be the better candidate for predicting the time to crash of a system under differentcircumstances.

    3.Experimentalsystem setup

    The main goalofthis paper is to compare the effectiveness ofdifferentmachine learning techniquesto predictthe time to crash of an aging system.To this end,some hypotheses are presented and some experiments have been carried out which willbe discussed in the following.

    As mentioned earlier,the software aging occurs due to misuses ofresources by applications such as memory leakage caused by notproperly releasing the allocated memory by running programs.Such misuses of system resources would cause a system crash due to eventual resource exhaustion.To modelsoftware aging in the system,we have developed a tool which injects memory leaks creating the conditions under which a system would crash.In this tool, a random number of dummy processes are created.Each created process contains an in fi nity loop inside which a speci fi c amountof memory is allocated and then released. The main point that should be noted is that the amountof memory allocation is supposed to be more than thatof the memory released in order to mimic the behavior of a memory leaking process.In the memory leakage injection tool,the amount of memory allocation in each process is determined by a Poisson process.Brie fl y,in the tool,we have two random variables including the number of the dummy process that follows a uniform process,and the amountof memory allocation in each process that follows a Poisson process.We analyze the machine learning algorithms in four different scenarios.The scenarios under consideration are as follows.

    (i)Scenario 1(Heavy leakage rate):In this scenario the amount of memory leakage for each dummy process follows a Poisson process with the rate bigger than 0.5 byte per second(λ≥0.5).We run several executions of this scenario varying the parameters in order to collectenough data to proper train the models.The number of processes is determined by a uniform distribution.Once the number of processes is chosen,itkeeps constantalong the run.

    (ii)Scenario 2(Light leakage rate):In this scenario the amount of memory leakage for each dummy process follows a Poisson process with the rate smaller than 0.5 byteper second(λ≤0.5).

    (iii)Scenario 3(Hybrid leakage rate):In this scenario we fi rst divide the number of dummy processes into two same sized groups.In the fi rstgroup,we use the same approach as Scenario 1 and for the second group we use the same approach as Scenario 2.

    (iv)Scenario 4(Random leakage rate):In this scenario, we do nothave any restriction for the rate ofmemory leakage for each dummy process i.e.λcan be any value between 0(the minimum value)and 1(the maximum value). The numberofprocesses is also random between 8 and 15.

    Table 1 describes the hardware/software used to build up the experimentalenvironment.

    Table 1 Experimentalsetup

    To predictthe time to crash by a machine learning technique,we need to pro fi le different system characteristics when our memory leakage injection tool is running.To do so,we employ a performance-monitoring tool of the Windows 7 OS which is called performance monitor[19].

    Before each experiment starts,we adjust the performance monitoring tool to collect the required data each second.The collected data are then saved to be analyzed in a log fi le.The log fi le contains differentsystem characteristics such as processorutilization,numberofprocesses and memory usage.After the dataset is collected,we add a new column(hold time)into the datasetrepresenting the time intervalbetween running our injection tools and observing a system crash.This process is called completing process.

    After collecting the dataset for each scenario,different machine learning algorithms are applied independently on the datasets and their prediction accuracies are compared. We use 80 percent of the collected data to build/train the modeland 20 percentto predictthe time to crash.The data instances percent of the collected data for the test phase used to train and testthe models is chosen randomly,once. Then the same training data and testing data are used for allthe models.

    Fig.2 illustrates the overall fl ow of the work conducted. To train and test the machine learning algorithms under study,we employ the well-known Waikato environmentfor knowledge analysis(WEKA)[20]machine learning(ML) and data mining package.

    4.ML algorithms

    In this section,we brie fl y describe the main characteristics of the compared machine learning algorithms.

    Linear regression:Linear regression(LR)is a method to modelthe linearrelationship between a scalardependent variable y and one or more independentvariables x.

    Least median square:The least median square(LMS) method is one of the statistical methods for solving the equations.This method is always used in analytical regression.In fact,LMS is a method for fi tting the dataset. The LMS must yield the smallestvalue for the median of squared residuals computed for the entire data set.This residuals refer to the difference between realdata and predicted data.

    Gaussian process:In probability theory,the Gaussian process(GP)consists of random values associated with every point in a range of times.The random variable has a normal distribution.In[20],it has been mentioned that“a Gaussian process is a stochastic process whose generalization of a Gaussian distribution overa fi nite vectorspace to a function space of in fi nite dimension”.

    M5P:M5P is a tree learner consisting of a binary decision tree which learns a“model”tree.This is a decision tree with LR functions at the leaves.It is used to predict a numeric target attribute.It may be piecewise fi t to the target[14,21].

    REPtree:REPtree(RT)builds a decision/regression tree using information gain/variance and prunes it using reduced-error pruning(with back fi tting).Only sort values for numeric attributes once.Missing values are dealt with by splitting the corresponding instances into pieces (i.e.as in C4.5)[14].

    Sequential minimal optimization:In[4,22],sequentialminimaloptimization(SMO)was proposed as an iterative algorithm.This algorithm uses supportvectormachine (SVM)forsolving the regression problemand SVMclassifi er design.The SMO algorithm has two worthy aspects: easy implementation and fastcomputationalspeed[23].

    Multilayer perceptron:The multilayer perceptron (MLP)is a very simple model of biological neural networks.The network is structured in a hierarchical way. MLP includessome nodes located in differentlayers where the information fl ows only from one layerto the nextlayer. The fi rst and the last layers are the input and the output. Layers between the input and the output layer are called hidden layers.This network is trained based on back propagation error in that the real outputs are compared with network outputs,and the weights are set using supervised back propagation to achieve the suitable model[24].

    5.Experiment results

    In this section,we comprehensively compare the machine learning algorithms to show which one is more effectiveand has a better accuracy in determining the time to crash under the considered scenarios.

    In scenarios explained in Section 3,the system is considered that crashes when the memory consumed by the system reaches 100%during two measurements.Afterrunning allmentioned scenarios and performing the completing process,each scenario datasetis used to train and compare the algorithms,including LR,SMO,MLP,M5P,LMS, RT and GP.

    As mentioned in Section 3,the completing process has been done by adding the real times to crash to our profi le.For comparing machine learning algorithms,we use the correlation coef fi cients,MAE,RMSE and RAE metrics.After computing each of these performance metrics, we rank the algorithms by computing the mean ranked position of each algorithm in each scenario.Thus,we sum the position of a algorithm in each scenario for an speci fi c metric and obtain the average rank.Based on this value, we rank the algorithms according to each metric of interest.Atthe end,we compute the overallranked position by the same approach.

    Table 2 presents the correlation coef fi cients of each algorithm per scenario.We can state that predicting values by MLP are directly and closely related to training dataset values,compared with otheralgorithms.On the otherside, the GP experiences worth average performance across the scenarios according to the rank.The rank list of the algorithms is as follows considering the four scenarios together:(i)MLP,(ii)M5P,(iii)SMO,(iv)LR,(v)RT,(vi) LMS and(vii)GP.Note that M5P and SMO obtain the same average ranked value across scenarios.For this reason,both are in the second position.

    MAE of each algorithm in each scenario is presented in Table 3.According to the average ranked position across scenarios,MLP offers the best results.Itindicates thatthe MLP algorithm is able to adapt better to different scenarios.The complete average rank listacross the fourscenarios is:(i)MLP,(ii)SMO,(iii)M5P,(iv)LR,(v)RT,(vi) LMS and(vii)GP.

    Table 4 presents the RMSE of each algorithm.The RMSE provides insightaboutthe presence of large errors. Therefore,the presence of a larger RMSE value indicates thatit is more likely to observe large errors(i.e.the difference between the realvalue and the predicted one).Since the goal is to obtain a model to predict the time to crash (or time to resource exhaustion)to trigger the software rejuvenation,we need models with a low probability oflarge errors.The complete average rank list across the four scenarios is:(i)MLP,(ii)M5P,(iii)LR,(iv)SMO,(v)RT,(vi) LMS and(vii)GP.

    Finally,Table 5 presents the RAE of each algorithm in each scenario.The RAE provides the errorpercentage normalized by the realvalue.We observe thatthe RAE is large since none of the algorithms are over 10%.Note that the algorithms are used with their default WEKA parameters. Therefore,itcan be expected thatadjusting the parameters properly of the algorithms these results can be improved signi fi cantly.According to the RAE results,the average rank list is as follows:(i)MLP,(ii)SMO,(iii)M5P,(iv) LR,(v)RT,(vi)LMS and(vii)GP.

    Table 2 Correlation coefficient of each algorithm and scenario under study

    Table 3 MAE of each algorithm and scenario under study

    Table 4 RMSEof each algorithm and scenario under study

    Table 5 RAE of each algorithm and scenario under study

    After analyzing the four performance metrics for all algorithms in four scenarios understudy,we propose to rank the algorithms per scenario,computing the average rank obtained in each performance metric.Then summarize the results per scenario.Finally,we also compute the fi nal rank across scenarios.We can observe that MLP is the best candidate in all scenarios(average rank of the four performance metrics underconsideration).AfterthatSMO presents the second average performance,followed by LR and M5P.On the other side,GP obtains the lastposition in the ranked list,showing its least suitability to predict the time to crash due to aging effects.Finally,Fig.2 presents the comparison between actual and predicted data in scenario 2.According to Fig.3,there is high matching between actualand predicted data by MLP in scenario 2.

    Fig.2 RAE ofeach algorithm and scenario under study

    Fig.3 Comparison between actualand predicted data in scenario 2

    6.Conclusions

    In this paper,we compare differentmachine learning algorithms underdifferentaging scenarios.As memory leakage is the most importantparameter in software aging,we implementa memory leakage injection which statistically injects memory leakage to understudy system equipped with a software rejuvenation technique to examine the accuracy of the technique.Using the memory leakage injection tool as wellas the performance monitoring toolthatis available in Windows 7 OS,we comprehensively compare different machine learning algorithms.Our experimental results show thatMLP obtains the betteroverallperformance among the studied algorithms under the four scenarios considered.As a future work,it would be necessary to compare the algorithms listed in this paper under more complex scenarios and when more complex aging factors are involved in order to study how generalizable are the results presented in this paper.

    [1]I.Koren,C.M.Krishna.Fault tolerant systems.Amsterdam: Elsevier,2007.

    [2]Y.Huang,C.Kintala,N.D.Funton.Software rejuvenation: analysis,module and applications.Proc.of the 25th IEEE International Symposium on Fault Tolerant Computing,1995: 381-390.

    [3]J.A.Lopez,R.Matias,E.Vicente,et al.A comparative experimental study of software rejuvenation overhead.Journal of Performance Evaluation,2013,70(3):231-250.

    [4]S.K.Shevade,S.S.Keerthi,C.Bhattacharyya,etal.Improvements to the SMO algorithm for SVM regression.IEEE Trans. on Neural Networks,2000,11(5):1188-1193.

    [5]K.Vaidyanathan,K.S.Trivedi.A comprehensive model for software rejuvenation.IEEE Trans.on Dependable and Secure Computing,2005,2(2):124-137.

    [6]J.A.Lopez,L.Silva,A.Andrzejak,et al.High-available grid services through the use of virtualized clustering.Proc.of the 8th IEEE/ACM International Conference on Grid Computing, 2007:34-41.

    [7]J.A.Lopez,J.Torres,R.Gavalda.Predicting web server crashes:a case study in comparing prediction algorithms. Proc.of the 34th International Conference on Distributed Computing Systems,2009:264-269.

    [8]J.A.Lopez,L.Belanche,D.R.Avresky.Predicting software anomalies using machine learning techniques.Proc.of the 10th IEEE International Symposium on Network Computing and Applications,2011:163-170.

    [9]R.Matos,J.Araujo,P.Maciel,et al.Software rejuvenation in eucalyptus cloud computing infrastructure:a hybrid method based on multiple thresholds and time series prediction.International Transactions on Systems Science and Applications, 2012(8):1-16.

    [10]J.A.Lopez,A.Bovenzi,J.Li,et al.Software rejuvenation --Do IT&Telco industries use it?Proc.of the 23rd IEEE International Symposium on Software Reliability Engineering Workshops,2012:229-304.

    [11]J.A.Lopez.Proactive software rejuvenation solution for web environments on virtualized platforms.Barcelona,Spain: Polytechnic University of Catalonia,2011.

    [12]J.A.Lopez,J.L.Berral,R.Gavalda,et al.Adaptive on-line software aging prediction based on machine learning.Proc.of the 40th IEEE/IFIP International Conference on Dependable Systems and Networks,2010:497-506.

    [13]A.Andrzejak,L.Silva.Using machine learning for nonintrusive modeling and prediction of software aging.Proc.of the IEEE Network Operations and Management Symposium, 2008:25-32.

    [14]I.H.Witten,F.Eibe.Data mining practical machine learning tools and techniques.Burlington:Elsevier,2005.

    [15]L.Silva,J.Alonso,J.Torres.Using virtualization to improve software rejuvenation.IEEE Trans.on Computers,2009, 58(11):1525-1538.

    [16]M.Grottke,L.Li,K.Vaidyanathan,etal.Analysis of software aging in a Web server.Proc.of IEEE Transactions on Reliability,2006,55(3):411-420.

    [17]L.Li,K.Vaidyanathan,K.S.Trivedi.An approach for estimation of software aging in a web server.Proc.ofthe International Symposium on Empirical Software Engineering,2002: 91-100.

    [18]P.F.Zheng,Q.G.Xu,Y.Qi.An advanced methodology for measuring and characterizing software aging.Proc.ofthe 23rd IEEE International Symposium on Software Reliability Engineering Workshops,2012:253-258.

    [19]Windows Performance Monitor.http://technet.microsoft.com/ en-us/library/cc749249.aspx.

    [20]Y.Wang,I.H.Witten.Intduction model trees for continuous classes.Proc.ofthe European Conference on Machine Learning Poster Papers,1997.

    [21]WEKA 3.6.8.http://www.cs.waikato.ac.nzlmllwekal.

    [22]A.J.Smola,B.Sch¨olkopf.A tutorialon support vector regression.London:Royal Holloway College,1998.

    [23]D.J.C.Mackay.Introduction to Gaussian processes.London: Cambridge University,1998.

    [24]A.Macedo,T.B.Ferreira,R.Matias.The mechanics of memory-related software aging.Proc.of the IEEE International Workshop on Software Aging and Rejuvenation,2010: 1-5.

    Biographies

    Moona Yakhchi received her M.S.degree in computer engineering from the Islam Azad University, Boroujerd,Iran,in 2012.Her current research interests are software rejuvenation and cloud computing.

    E-mail:m.yakhchi@gmail.com

    Javier Alonso received his M.S.degree in computer science in 2004 and Ph.D.degree from the Technical University of Catalonia(UniversitatPolitecnica de Catalunya,UPC)in 2011.From 2006 to 2011, he was an assistant lecturer in the Computer Architecture Department of UPC.From 2011 to 2014,he was a postdoctoral associate in the Electrical and Computer Engineering Department,Duke University.Since 2014,he has been the research manager in the Institute of Applied Sciences on Cybersecurity at University of Leon,Spain.He has published more than 30 papers in premier conferences and journals.He is a member of IEEE.He has also served as a reviewer for IEEE Transactions on Computers,IE EE Transactions on Dependability and Security Computing,Performance Evaluation,and Cluster Computing,and severalinternational conferences.His research interests are dependability,reliability,availability,and performance of computer and communication systems.He has special interests in software dependability and software aging and rejuvenation topics.

    E-mail:javier.alonso@unileon.es

    Mahdi Fazeli received his M.S.and Ph.D.degrees in computer engineering from the Sharif University of Technology,Tehran,Iran,in 2005 and 2011, respectively.He has been with the Department of Computer Engineering,Iran University of Science and Technology(IUST),since 2011,where he is currently an assistant professor.He established the Dependable Systems and Architectures Laboratory (DSALab)atIUST in 2012 and he has chaired the Laboratory since then. He has authored orco-authored more than 40 papers in reputable journals and conferences.His current research interests include reliable issues in VLSIcircuits and emerging technologies,hardware security,dependable embedded systems,low power circuits and systems,fault-tolerant computer architectures,and reliability modeling and evaluation.

    E-mail:m fazeli@iust.ac.ir

    Amir Akhavan Bitaraf received his M.S.degree in software engineering from Islamic Azad University, Broujerd,Iran in 2012.He has been collaborating with Broujerd branch of Sama Technical and Vocational Training College since 2010.He is interested in software engineering,data mining and software fault tolerance,especially software aging and rejuvenation.

    E-mail:bitarafaa@gmail.com

    Ahmad Patooghy received his M.S.and Ph.D.degrees in computer engineering from Sharif University of Technology,Tehran,Iran,in 2005 and 2011, respectively.He is currently an assistance professor at Department of Computer Engineering,Iran University of Science&Technology,Tehran,Iran.He initiated the Dependable Systems and Architectures Laboratory at Iran University of Science and Technology in 2012 and has chaired the Laboratory since then.His research interests include hardware design and test,architectural design of multiand many-core chips,dependability and security evaluation of VLSIcircuits,faultinjection,and analytical modeling.

    E-mail:patooghy@iust.ac.ir

    10.1109/JSEE.2015.00047

    Manuscriptreceived December 27,2013.

    *Corresponding author.

    美女xxoo啪啪120秒动态图| 黄色视频,在线免费观看| 嫩草影院新地址| 久久午夜福利片| 真人一进一出gif抽搐免费| 美女 人体艺术 gogo| 国产久久久一区二区三区| 中文字幕高清在线视频| 国产精品久久久久久久电影| 草草在线视频免费看| 嫩草影院精品99| 日韩高清综合在线| 美女高潮的动态| 亚洲三级黄色毛片| 久久精品91蜜桃| 色噜噜av男人的天堂激情| 极品教师在线免费播放| 国产精品嫩草影院av在线观看 | 老熟妇乱子伦视频在线观看| 亚洲国产精品sss在线观看| 亚洲国产欧美人成| www.www免费av| 久久精品国产亚洲网站| 九色国产91popny在线| 搞女人的毛片| 午夜影院日韩av| 亚洲无线在线观看| 99在线视频只有这里精品首页| 内地一区二区视频在线| 少妇高潮的动态图| 国产不卡一卡二| 琪琪午夜伦伦电影理论片6080| 亚洲黑人精品在线| 91精品国产九色| 男女那种视频在线观看| 女同久久另类99精品国产91| 最新中文字幕久久久久| 国产精品精品国产色婷婷| 国产亚洲精品久久久com| 欧美日韩亚洲国产一区二区在线观看| 日韩欧美在线乱码| 亚洲精品亚洲一区二区| 成年女人永久免费观看视频| 精品一区二区三区视频在线| 亚洲欧美日韩高清在线视频| 精品一区二区三区视频在线观看免费| 搡女人真爽免费视频火全软件 | 岛国在线免费视频观看| 99热6这里只有精品| av在线老鸭窝| 免费观看在线日韩| 久久久久久伊人网av| 狠狠狠狠99中文字幕| 精品无人区乱码1区二区| 亚洲在线观看片| 黄色日韩在线| 日本 av在线| 少妇裸体淫交视频免费看高清| 最近在线观看免费完整版| av黄色大香蕉| 一区二区三区激情视频| 亚州av有码| 男女之事视频高清在线观看| 桃色一区二区三区在线观看| 国产午夜精品论理片| 国产高清视频在线播放一区| 亚洲真实伦在线观看| 久久国产乱子免费精品| 久久欧美精品欧美久久欧美| 悠悠久久av| 国产免费一级a男人的天堂| 色哟哟哟哟哟哟| 成人av一区二区三区在线看| 午夜福利在线在线| 久久精品国产自在天天线| 国产主播在线观看一区二区| 热99在线观看视频| 99热只有精品国产| 国产精品精品国产色婷婷| 性色avwww在线观看| 国产日本99.免费观看| 久久精品国产亚洲av天美| 老师上课跳d突然被开到最大视频| 中文在线观看免费www的网站| 成年女人毛片免费观看观看9| 999久久久精品免费观看国产| 免费在线观看日本一区| 国产午夜精品论理片| 波野结衣二区三区在线| av.在线天堂| 国产精品综合久久久久久久免费| 亚洲第一区二区三区不卡| 亚洲最大成人中文| 国产在线精品亚洲第一网站| 中文资源天堂在线| 午夜日韩欧美国产| 国产精品乱码一区二三区的特点| 伦精品一区二区三区| 久久久精品大字幕| 中文字幕高清在线视频| 国产伦一二天堂av在线观看| 人妻夜夜爽99麻豆av| 久久精品久久久久久噜噜老黄 | 日本与韩国留学比较| 国产av在哪里看| 久久这里只有精品中国| 国产高清视频在线观看网站| 哪里可以看免费的av片| 免费大片18禁| 一区二区三区四区激情视频 | 天堂网av新在线| 亚洲av成人精品一区久久| 免费在线观看日本一区| 亚洲色图av天堂| 精品一区二区三区人妻视频| 永久网站在线| 久久精品人妻少妇| 国产午夜精品久久久久久一区二区三区 | 国产主播在线观看一区二区| 99热网站在线观看| 国产精品一区二区三区四区久久| АⅤ资源中文在线天堂| 国产精品爽爽va在线观看网站| av视频在线观看入口| 色精品久久人妻99蜜桃| 简卡轻食公司| 蜜桃亚洲精品一区二区三区| 中文字幕久久专区| 夜夜看夜夜爽夜夜摸| 村上凉子中文字幕在线| 偷拍熟女少妇极品色| 欧美3d第一页| h日本视频在线播放| 色在线成人网| 精品久久久久久久末码| 国产综合懂色| 又粗又爽又猛毛片免费看| or卡值多少钱| 特大巨黑吊av在线直播| 成人特级黄色片久久久久久久| 亚洲av美国av| 美女高潮的动态| 国产精品1区2区在线观看.| 自拍偷自拍亚洲精品老妇| 一a级毛片在线观看| 亚洲欧美日韩高清在线视频| 又爽又黄无遮挡网站| 国产aⅴ精品一区二区三区波| 午夜精品一区二区三区免费看| 老师上课跳d突然被开到最大视频| 中文字幕高清在线视频| 色综合婷婷激情| 日日摸夜夜添夜夜添av毛片 | 村上凉子中文字幕在线| avwww免费| 在线免费观看的www视频| 中文字幕熟女人妻在线| 欧美成人性av电影在线观看| 国内精品宾馆在线| 午夜激情欧美在线| 日韩欧美国产在线观看| 校园春色视频在线观看| 日韩欧美在线乱码| 精品久久久久久久久久免费视频| 直男gayav资源| 日韩国内少妇激情av| 日韩欧美精品v在线| 69av精品久久久久久| 别揉我奶头~嗯~啊~动态视频| 国产综合懂色| 欧美日韩黄片免| 3wmmmm亚洲av在线观看| 毛片女人毛片| 欧美绝顶高潮抽搐喷水| 高清日韩中文字幕在线| x7x7x7水蜜桃| 欧美日韩国产亚洲二区| 午夜福利高清视频| 日日干狠狠操夜夜爽| 亚洲四区av| 欧美色欧美亚洲另类二区| 看黄色毛片网站| 国产乱人伦免费视频| 少妇熟女aⅴ在线视频| 亚洲中文字幕日韩| 日韩在线高清观看一区二区三区 | 亚洲第一区二区三区不卡| 日日啪夜夜撸| 成人无遮挡网站| 成人美女网站在线观看视频| 97人妻精品一区二区三区麻豆| 日本 欧美在线| 亚洲av成人精品一区久久| 日本与韩国留学比较| 久久亚洲真实| 免费av观看视频| eeuss影院久久| 亚洲欧美清纯卡通| 亚洲性久久影院| 他把我摸到了高潮在线观看| 给我免费播放毛片高清在线观看| 欧美+日韩+精品| 一进一出好大好爽视频| 在线免费观看不下载黄p国产 | 99久久精品国产国产毛片| 日韩欧美在线乱码| 日韩欧美三级三区| 成人鲁丝片一二三区免费| 麻豆成人av在线观看| 99在线人妻在线中文字幕| 国产精品伦人一区二区| av在线蜜桃| 男女之事视频高清在线观看| 美女被艹到高潮喷水动态| www日本黄色视频网| 桃红色精品国产亚洲av| 久久久久久久久久成人| 香蕉av资源在线| 国产美女午夜福利| 国产精品98久久久久久宅男小说| 久久久精品欧美日韩精品| 久久久久久久久久久丰满 | 国产亚洲av嫩草精品影院| 欧美高清成人免费视频www| 国产伦精品一区二区三区视频9| 国产欧美日韩一区二区精品| 色综合色国产| 九九热线精品视视频播放| 一卡2卡三卡四卡精品乱码亚洲| 国产一级毛片七仙女欲春2| 我要搜黄色片| 国产欧美日韩精品一区二区| 久久99热这里只有精品18| 熟女人妻精品中文字幕| 日本黄色视频三级网站网址| 制服丝袜大香蕉在线| 亚洲欧美日韩高清在线视频| www日本黄色视频网| 久久午夜亚洲精品久久| 国产黄片美女视频| 国产精品自产拍在线观看55亚洲| 97超级碰碰碰精品色视频在线观看| 天堂网av新在线| 国产黄片美女视频| 亚洲精品在线观看二区| 草草在线视频免费看| 毛片一级片免费看久久久久 | 久久久久国产精品人妻aⅴ院| 少妇丰满av| 99riav亚洲国产免费| 99精品在免费线老司机午夜| 欧美日本亚洲视频在线播放| 成人特级av手机在线观看| 性欧美人与动物交配| 国产精品乱码一区二三区的特点| 草草在线视频免费看| 午夜精品久久久久久毛片777| 成人欧美大片| 国产精品综合久久久久久久免费| 国产精品女同一区二区软件 | 亚洲一区二区三区色噜噜| 黄色女人牲交| 久久天躁狠狠躁夜夜2o2o| 日本在线视频免费播放| 国内精品一区二区在线观看| 精品人妻1区二区| 亚洲最大成人av| 亚洲成人久久爱视频| 尤物成人国产欧美一区二区三区| 又紧又爽又黄一区二区| 我的女老师完整版在线观看| 国产成人影院久久av| 久久久久精品国产欧美久久久| 日本成人三级电影网站| 亚洲av.av天堂| 久久国内精品自在自线图片| av在线老鸭窝| 一区二区三区高清视频在线| 久久久久久国产a免费观看| bbb黄色大片| 午夜日韩欧美国产| 婷婷色综合大香蕉| 岛国在线免费视频观看| 亚洲中文日韩欧美视频| 波多野结衣高清作品| 精品午夜福利视频在线观看一区| 神马国产精品三级电影在线观看| 1024手机看黄色片| 麻豆成人av在线观看| 国产黄色小视频在线观看| 可以在线观看毛片的网站| 热99在线观看视频| 老司机福利观看| 日韩欧美国产一区二区入口| 国产欧美日韩一区二区精品| 亚洲电影在线观看av| 亚洲欧美日韩卡通动漫| 搞女人的毛片| 免费看美女性在线毛片视频| 国产激情偷乱视频一区二区| 亚洲自偷自拍三级| 精品久久久久久久久久免费视频| 99热网站在线观看| 久久精品国产亚洲av天美| 日韩欧美精品v在线| 熟女人妻精品中文字幕| 亚洲成人久久性| 男人的好看免费观看在线视频| 一个人看视频在线观看www免费| 亚洲国产欧美人成| 国产精品电影一区二区三区| 国产男人的电影天堂91| 啦啦啦观看免费观看视频高清| 男女做爰动态图高潮gif福利片| 99在线视频只有这里精品首页| 18+在线观看网站| 亚洲精品一区av在线观看| 欧美成人性av电影在线观看| 久久久久久久久久成人| 深爱激情五月婷婷| 在线国产一区二区在线| 亚洲精品粉嫩美女一区| 亚洲欧美日韩高清在线视频| 长腿黑丝高跟| 十八禁国产超污无遮挡网站| 亚洲综合色惰| 久久精品国产亚洲av天美| 搡老岳熟女国产| 亚洲欧美激情综合另类| ponron亚洲| 午夜免费激情av| 又黄又爽又免费观看的视频| 成年免费大片在线观看| 日韩人妻高清精品专区| 非洲黑人性xxxx精品又粗又长| 亚洲中文字幕一区二区三区有码在线看| 欧美xxxx黑人xx丫x性爽| 久久久久国产精品人妻aⅴ院| 深爱激情五月婷婷| 特级一级黄色大片| 国产黄色小视频在线观看| 搡老熟女国产l中国老女人| 丰满乱子伦码专区| 国产精品野战在线观看| 女生性感内裤真人,穿戴方法视频| 亚洲欧美日韩高清在线视频| 国产高清视频在线观看网站| 天堂网av新在线| 国产精品人妻久久久影院| 又爽又黄a免费视频| avwww免费| 亚洲欧美精品综合久久99| 亚洲美女黄片视频| 又爽又黄无遮挡网站| 精品人妻1区二区| 国产成人av教育| 三级国产精品欧美在线观看| 能在线免费观看的黄片| 两个人的视频大全免费| 亚洲欧美日韩高清专用| 国内精品美女久久久久久| 亚洲五月天丁香| 国产毛片a区久久久久| 国产精品女同一区二区软件 | 天美传媒精品一区二区| 伦精品一区二区三区| 国内毛片毛片毛片毛片毛片| 欧美激情国产日韩精品一区| 一级毛片久久久久久久久女| av在线亚洲专区| 久久久精品欧美日韩精品| 成人精品一区二区免费| 欧美日韩中文字幕国产精品一区二区三区| 亚洲在线观看片| 亚洲av免费在线观看| 久久人妻av系列| 久久99热这里只有精品18| 黄色丝袜av网址大全| 午夜a级毛片| 欧美极品一区二区三区四区| 搡女人真爽免费视频火全软件 | 精品久久久噜噜| 香蕉av资源在线| 在线播放国产精品三级| 国产精品久久久久久精品电影| 别揉我奶头 嗯啊视频| 国产高清激情床上av| 亚洲美女搞黄在线观看 | 久久久久久久精品吃奶| h日本视频在线播放| 天天躁日日操中文字幕| 欧美激情久久久久久爽电影| 狠狠狠狠99中文字幕| 少妇高潮的动态图| 精品久久久久久久末码| 日韩中文字幕欧美一区二区| 99久久精品国产国产毛片| 成人特级黄色片久久久久久久| 给我免费播放毛片高清在线观看| 99久久久亚洲精品蜜臀av| 国产精品嫩草影院av在线观看 | 性色avwww在线观看| 国产精品亚洲一级av第二区| 高清毛片免费观看视频网站| 亚洲电影在线观看av| 亚洲最大成人手机在线| ponron亚洲| 亚洲人成伊人成综合网2020| 日韩欧美精品v在线| 久久草成人影院| 少妇人妻一区二区三区视频| 婷婷丁香在线五月| 久久久久久久久大av| 最近最新中文字幕大全电影3| 久久久久久久久久黄片| 亚洲av成人精品一区久久| 亚洲av成人av| 少妇的逼水好多| 最近视频中文字幕2019在线8| 日韩欧美在线乱码| 欧美日韩中文字幕国产精品一区二区三区| 在线播放国产精品三级| 成人国产一区最新在线观看| 不卡一级毛片| 淫秽高清视频在线观看| 亚洲第一电影网av| 午夜福利在线在线| 欧美xxxx黑人xx丫x性爽| 国产激情偷乱视频一区二区| 国产高清激情床上av| 成人性生交大片免费视频hd| 欧美不卡视频在线免费观看| 噜噜噜噜噜久久久久久91| 精品人妻一区二区三区麻豆 | 亚洲av中文字字幕乱码综合| 他把我摸到了高潮在线观看| 成年女人毛片免费观看观看9| 成人国产一区最新在线观看| 日本欧美国产在线视频| 亚洲最大成人中文| 淫秽高清视频在线观看| 老师上课跳d突然被开到最大视频| 久久人人精品亚洲av| 日韩 亚洲 欧美在线| 精品一区二区三区视频在线观看免费| 国产精品久久久久久av不卡| 亚洲精华国产精华液的使用体验 | 亚洲综合色惰| 成人综合一区亚洲| a级毛片免费高清观看在线播放| 中国美白少妇内射xxxbb| 免费大片18禁| 亚洲av二区三区四区| 桃红色精品国产亚洲av| 在线观看av片永久免费下载| 精品久久久久久久久av| av黄色大香蕉| 久久人人爽人人爽人人片va| 中文字幕高清在线视频| 亚洲七黄色美女视频| 国语自产精品视频在线第100页| 久久天躁狠狠躁夜夜2o2o| 亚洲一区二区三区色噜噜| bbb黄色大片| 亚洲自拍偷在线| 亚洲人成网站在线播| 精品一区二区免费观看| 欧美一级a爱片免费观看看| 床上黄色一级片| 午夜免费男女啪啪视频观看 | 男人狂女人下面高潮的视频| 成人国产麻豆网| 乱码一卡2卡4卡精品| 亚洲内射少妇av| 搞女人的毛片| 久久久久国内视频| 国产爱豆传媒在线观看| 成人二区视频| 久久婷婷人人爽人人干人人爱| 成人综合一区亚洲| 深爱激情五月婷婷| .国产精品久久| 午夜福利视频1000在线观看| 在线观看av片永久免费下载| 国产v大片淫在线免费观看| 国产精品一及| 赤兔流量卡办理| 99国产精品一区二区蜜桃av| 亚洲精品一卡2卡三卡4卡5卡| 亚洲av免费高清在线观看| 久久热精品热| 亚洲avbb在线观看| 哪里可以看免费的av片| 日韩,欧美,国产一区二区三区 | 99国产极品粉嫩在线观看| 特大巨黑吊av在线直播| 国产男人的电影天堂91| 老司机深夜福利视频在线观看| 性色avwww在线观看| 亚洲精品亚洲一区二区| 亚洲不卡免费看| 十八禁网站免费在线| 亚洲,欧美,日韩| 亚洲va在线va天堂va国产| 日韩欧美国产一区二区入口| 亚洲不卡免费看| 波野结衣二区三区在线| 国产成人aa在线观看| 少妇丰满av| 精品国内亚洲2022精品成人| 69人妻影院| 欧美日韩黄片免| 免费看av在线观看网站| 亚州av有码| 91在线观看av| 色精品久久人妻99蜜桃| 国产精品综合久久久久久久免费| 99久久精品国产国产毛片| 国产精品亚洲一级av第二区| 久久久久国内视频| 麻豆久久精品国产亚洲av| 亚洲精品456在线播放app | 在线国产一区二区在线| 午夜福利在线观看吧| 欧美一区二区精品小视频在线| 女的被弄到高潮叫床怎么办 | 老司机深夜福利视频在线观看| 免费观看的影片在线观看| 久久人人精品亚洲av| 国产 一区 欧美 日韩| 淫秽高清视频在线观看| 欧美日韩综合久久久久久 | 两个人的视频大全免费| 女的被弄到高潮叫床怎么办 | 亚洲欧美日韩东京热| 一本久久中文字幕| 最好的美女福利视频网| 欧洲精品卡2卡3卡4卡5卡区| 亚洲精品国产成人久久av| .国产精品久久| 99热6这里只有精品| 他把我摸到了高潮在线观看| 韩国av一区二区三区四区| 国模一区二区三区四区视频| 男人舔奶头视频| 级片在线观看| 免费看美女性在线毛片视频| 999久久久精品免费观看国产| 亚洲精品456在线播放app | 老司机深夜福利视频在线观看| 亚洲四区av| 精华霜和精华液先用哪个| 99热精品在线国产| 毛片一级片免费看久久久久 | 真人一进一出gif抽搐免费| www日本黄色视频网| 日日摸夜夜添夜夜添小说| 嫩草影院入口| 国产三级中文精品| 国产aⅴ精品一区二区三区波| 日韩欧美免费精品| 1000部很黄的大片| 特大巨黑吊av在线直播| 女生性感内裤真人,穿戴方法视频| h日本视频在线播放| 免费在线观看成人毛片| 亚州av有码| 看免费成人av毛片| 一进一出抽搐动态| 日日撸夜夜添| 老司机深夜福利视频在线观看| 99在线视频只有这里精品首页| 久久精品夜夜夜夜夜久久蜜豆| 国产av麻豆久久久久久久| 色播亚洲综合网| 国产乱人视频| 高清在线国产一区| 中文字幕熟女人妻在线| 精品一区二区三区视频在线观看免费| 婷婷丁香在线五月| 丰满乱子伦码专区| 在线天堂最新版资源| 极品教师在线视频| 琪琪午夜伦伦电影理论片6080| 日本成人三级电影网站| 成人二区视频| 久久久久久国产a免费观看| 女同久久另类99精品国产91| 男人狂女人下面高潮的视频| 亚洲av成人av| 亚洲精品一卡2卡三卡4卡5卡| 色视频www国产| 亚洲自偷自拍三级| 免费av观看视频| 午夜精品在线福利| 人妻夜夜爽99麻豆av| 久久99热6这里只有精品| 婷婷精品国产亚洲av| 久久久久性生活片| 日韩中字成人| 欧美中文日本在线观看视频| 国产欧美日韩精品亚洲av| 免费无遮挡裸体视频| 在线免费观看不下载黄p国产 | 日韩欧美精品免费久久| 日本色播在线视频| 日韩欧美精品免费久久| 精品一区二区三区视频在线观看免费| 成人亚洲精品av一区二区| 欧美一区二区国产精品久久精品| 欧美高清成人免费视频www| 成人无遮挡网站| av国产免费在线观看| 麻豆一二三区av精品| 九九热线精品视视频播放|