• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Neuralnetwork based approach for time to crash prediction to cope with software aging

    2015-12-23 10:09:17,3,*,3

    ,3,*,3

    1.Schoolof Computer Science,Institute for Research in Fundamental Sciences(IPM),Tehran 19395-5746,Iran; 2.Institute of Advanced Studies on Cybersecurity,University of Leon,Leon 24005,Spain; 3.Departmentof Computer Engineering,Iran University of Technology,Tehran 1684613114,Iran

    Neuralnetwork based approach for time to crash prediction to cope with software aging

    Moona Yakhchi1,Javier Alonso2,MahdiFazeli1,3,*,Amir Akhavan Bitaraf1,Ahmad Patooghy1,3

    1.Schoolof Computer Science,Institute for Research in Fundamental Sciences(IPM),Tehran 19395-5746,Iran; 2.Institute of Advanced Studies on Cybersecurity,University of Leon,Leon 24005,Spain; 3.Departmentof Computer Engineering,Iran University of Technology,Tehran 1684613114,Iran

    Recent studies have shown that software is one of the main reasons for computer systems unavailability.A growing accumulation of software errors with time causes a phenomenon called software aging.This phenomenon can resultin system performance degradation and eventually system hang/crash.To cope with software aging,software rejuvenation has been proposed. Software rejuvenation is a proactive technique which leads to removing the accumulated software errors by stopping the system, cleaning up its internal state,and resuming its normal operation. One of the main challenges of software rejuvenation is accurately predicting the time to crash due to aging factors such as memory leaks.In this paper,different machine learning techniques are compared to accurately predict the software time to crash under different aging scenarios.Finally,by comparing the accuracy ofdifferenttechniques,it can be concluded thatthe multilayer perceptron neuralnetwork has the highestprediction accuracy among alltechniques studied.

    software reliability,software rejuvenation,machine learning.

    1.Introduction

    Ever-increasing use of computer systems in human life requires high levels of reliability and availability of such systems.Computer systems have a variety of applications ranging from safety critical applications such as medical, industrial,and military systems to non-criticalapplications such as e-commerce websites or consumer electronic devices.

    The complexity of today’s computer systems has severely challenged the availability of such systems.Availability has been regarded as an important issue in safety criticalapplications;however,ithas also become a serious concern in today’s non-safety critical applications due to the increasing societal dependency on IT systems.Moreover,IT system failures have importantpro fi tcostand also erode the company’s reputation and negatively impact its future marketshare[1].

    The underlying causes of system failures can be classifi ed into software errors,hardware errors and human errors.Software errors are becoming the main reason of the system failures due to their growing complexity.The software aging phenomenon causes a non-negligible fraction of system failures.Software aging was introduced in[2]. It is de fi ned as an accumulation of software errors with time,which can resultin resource exhaustion,performance degradation,and eventually system crash.Software aging is caused by aging-related bugs(ARBs)[3].Some examples of the effects of ARBs are memory leakage[4],memory fragmentation[4],unterminated threads[5],or data expiration[2,5].

    The software aging phenomenon may lead to system crash.Hence itis ofdecisive importance to cope with software aging effects.As a counter measure of software aging,software rejuvenation was proposed[2].Software rejuvenation is a proactive approach in contrast with traditional reactive approaches to deal with software failures, which removes the aging effects by stopping the aging system,cleaning its internalstate and resuming its operation. This would prevent or mitigate the performance degradation,and even itcan avoid or delay software crash.

    Software rejuvenation is classi fi ed into two main categories based on how the rejuvenation is triggered(See Fig.1,adapted from[3]):time-based and inspectionbased approaches.In the time-based approach,the rejuvenation activation is triggered at regular time intervals[5]. Inspection-based approaches monitorthe system state and, when itcrosses certain pre-speci fi ed limit,the rejuvenation is activated.The inspection-based approach is sub-dividedinto three approaches:threshold-based,prediction-based, and mixed approaches.In threshold-based approaches,the activation threshold is pre fi xed based on the experience or human expertise[6].In prediction-based approaches,a prediction mechanism(e.g.,machine learning and statistical approaches)is used to estimate the time to crash(or time to resource exhaustion)[7,8].Based on the predicted measure the rejuvenation is triggered when the crash is imminent.Therefore,in this approach a predictive function is required.In mixed approaches,it is a combination of threshold-based and prediction-based approaches together [9].

    Fig.1 Software rejuvenation scheduling strategies

    According to[10],prediction approaches are gaining attention from industry and academia as a future mechanism to implement software rejuvenation.In order to develop the prediction-based software rejuvenation mechanism,it requires a highly accurate prediction function.Thus,prediction approaches mustbe able to predict,with high accuracy,the time to crash or time to resource exhaustion due to software aging effects.This willallow triggering the rejuvenation only when it is strictly necessary according to the system state.

    Prediction-based approaches which require a prediction function according to the current/past state of the system will predict the future system state.Previous papers have compared the prediction accuracy of different machine learning algorithms to predictthe state of the system under the effectof software[7,8,11-13].

    However,due to the vast number of machine learning algorithms,there are still differentmachine learning algorithms not analyzed.In this paper,we present an experimental comparison of multilayer perceptron neural network(MPNN)[14]with the best candidates revealed in previous papers.MPNN is compared with some ofthe best well-known machine learning algorithms and some of the bestcandidates revealed in the previous papers[12,13].

    We rank the algorithms according to theircorrelation coef fi cients,mean absolute error(MAE),root mean squared error(RMSE)and relative absolute error(RAE).We compare the algorithms under four different software aging scenarios.The results reveal that MPNN is the best candidate according to allmetrics of interest.

    The rest of the paper is organized as follows.Section 2 presents the related work.Section 3 describes the experimental environment.Section 4 brie fl y introduces the machine learning algorithms compared in our experimental study.Section 5 discusses the obtained results and fi nally Section 6 concludes the paper.

    2.Related work

    Huang et al.[2]introduced software rejuvenation as a proactive countermeasure of software aging.As ithas been aforementioned,software rejuvenation is classi fi ed according to how the rejuvenation is scheduled as time-based or inspection-based strategies.Time-based approaches focus on trying to estimate the mostsuitable time intervalto triggerthe rejuvenation[5].However,time-based rejuvenation strategies do not usually take into accountthe state of the system under monitoring,and thus,it is possible thatthey trigger unnecessary rejuvenation actions.In order to fi ll this gap,inspection-based approaches have been proposed. Inspection-based approaches are characterized by monitoring the state ofthe system(i.e.,monitoring memory usage, CPU usage,orother resources)and determining if the system is aged.If it is the case,the rejuvenation is triggered. The mechanism to determine the aging of the system subdivides inspection-based approaches into threshold-based approaches and prediction-based approaches.The former approaches de fi ne a threshold for the aging factor(e.g., memory usage),when the threshold is reached the rejuvenation is triggered[6,15].These strategies have important limitations since they require knowing the aging factor(s) in advance,which is notalways possible.Furthermore,the threshold becomes a key factor for the availability of thesystem.If the threshold is notaccurately fi xed,the system can crash or offer an unacceptable performance before the rejuvenation is triggered.

    Several papers have presented different mechanisms to predict/estimate the time to crash or time to resource exhaustion,using statistical or machine learning techniques [7,8,12,13,16,17].These techniques use historical system state metrics easily collected in any system to estimate the time to crash or to resource exhaustion.Some examples of these system state metrics are throughput,response time, CPU usage,memory consumed by the system ora speci fi c application,numberofthreads,or numberof TCP connections.

    In[16]Sens’s slope statisticaltechnique is used to estimate the resource exhaustion trend.Sen’s slope statistical technique is also able to estimate this trend in presence of seasonal behavioral data.Once they obtain the aging trend,the time series approach is used to estimate the time to resource exhaustion.In[18],the authors compare the Mann-Kendall trend and Sen’s slope approaches with the Hodrick-Prescott fi lter and the multi-scale Mann-Whitney U test.The results show that the Hodrick-Prescott fi lter and the multi-scale Mann-Whiteney test improve the accuracy of Sen’s slope and Mann-Kendall,offering a unifi ed structure without requiring a previous seasonal test. Furthermore,the proposal approach is able to distinguish between abruptchanges and aging degradation.

    Time series autoregressive moving average(ARMA) models are used in[17]to estimate the resource exhaustion time.This paper recognizes the relationship between the aging trend and the workload.However,all aforementioned papers assume thatthe aging factor is known in advance.

    There also are a set of papers where different machine learning algorithms have been compared each other under differentaging scenarios.In[13],the authors compare Na¨?ve Bayes,decision trees and support vector machine algorithms to predict time to crash due to aging.However,the considered aging is constant along the time.In [7]and[12],the authors compared linear regression,decision trees and a mixed algorithm called M5P under different dynamic and complex scenarios.These papers consider scenarios where the aging trend changes along the time with and without dependency of the workload.The study revealed that M5P was a good candidate to predict the time to crash under different scenarios and different/combined aging factors(i.e.,memory and threads).

    The main goal of any of the software aging prediction approaches is to decide if the system requires rejuvenation.Thus,itis only required to know the state of the system.Following this idea,differentclassi fi cation algorithms were compared in[12]underthe same scenarios presented in[7].Random forest was determined as the best candidate.

    In this paper,we are interested in extending the number of machine learning algorithms analyzed to modelthe aging phenomena under different aging scenarios.This will provide more information to practitioners and researchers about which the machine learning algorithm will be the better candidate for predicting the time to crash of a system under differentcircumstances.

    3.Experimentalsystem setup

    The main goalofthis paper is to compare the effectiveness ofdifferentmachine learning techniquesto predictthe time to crash of an aging system.To this end,some hypotheses are presented and some experiments have been carried out which willbe discussed in the following.

    As mentioned earlier,the software aging occurs due to misuses ofresources by applications such as memory leakage caused by notproperly releasing the allocated memory by running programs.Such misuses of system resources would cause a system crash due to eventual resource exhaustion.To modelsoftware aging in the system,we have developed a tool which injects memory leaks creating the conditions under which a system would crash.In this tool, a random number of dummy processes are created.Each created process contains an in fi nity loop inside which a speci fi c amountof memory is allocated and then released. The main point that should be noted is that the amountof memory allocation is supposed to be more than thatof the memory released in order to mimic the behavior of a memory leaking process.In the memory leakage injection tool,the amount of memory allocation in each process is determined by a Poisson process.Brie fl y,in the tool,we have two random variables including the number of the dummy process that follows a uniform process,and the amountof memory allocation in each process that follows a Poisson process.We analyze the machine learning algorithms in four different scenarios.The scenarios under consideration are as follows.

    (i)Scenario 1(Heavy leakage rate):In this scenario the amount of memory leakage for each dummy process follows a Poisson process with the rate bigger than 0.5 byte per second(λ≥0.5).We run several executions of this scenario varying the parameters in order to collectenough data to proper train the models.The number of processes is determined by a uniform distribution.Once the number of processes is chosen,itkeeps constantalong the run.

    (ii)Scenario 2(Light leakage rate):In this scenario the amount of memory leakage for each dummy process follows a Poisson process with the rate smaller than 0.5 byteper second(λ≤0.5).

    (iii)Scenario 3(Hybrid leakage rate):In this scenario we fi rst divide the number of dummy processes into two same sized groups.In the fi rstgroup,we use the same approach as Scenario 1 and for the second group we use the same approach as Scenario 2.

    (iv)Scenario 4(Random leakage rate):In this scenario, we do nothave any restriction for the rate ofmemory leakage for each dummy process i.e.λcan be any value between 0(the minimum value)and 1(the maximum value). The numberofprocesses is also random between 8 and 15.

    Table 1 describes the hardware/software used to build up the experimentalenvironment.

    Table 1 Experimentalsetup

    To predictthe time to crash by a machine learning technique,we need to pro fi le different system characteristics when our memory leakage injection tool is running.To do so,we employ a performance-monitoring tool of the Windows 7 OS which is called performance monitor[19].

    Before each experiment starts,we adjust the performance monitoring tool to collect the required data each second.The collected data are then saved to be analyzed in a log fi le.The log fi le contains differentsystem characteristics such as processorutilization,numberofprocesses and memory usage.After the dataset is collected,we add a new column(hold time)into the datasetrepresenting the time intervalbetween running our injection tools and observing a system crash.This process is called completing process.

    After collecting the dataset for each scenario,different machine learning algorithms are applied independently on the datasets and their prediction accuracies are compared. We use 80 percent of the collected data to build/train the modeland 20 percentto predictthe time to crash.The data instances percent of the collected data for the test phase used to train and testthe models is chosen randomly,once. Then the same training data and testing data are used for allthe models.

    Fig.2 illustrates the overall fl ow of the work conducted. To train and test the machine learning algorithms under study,we employ the well-known Waikato environmentfor knowledge analysis(WEKA)[20]machine learning(ML) and data mining package.

    4.ML algorithms

    In this section,we brie fl y describe the main characteristics of the compared machine learning algorithms.

    Linear regression:Linear regression(LR)is a method to modelthe linearrelationship between a scalardependent variable y and one or more independentvariables x.

    Least median square:The least median square(LMS) method is one of the statistical methods for solving the equations.This method is always used in analytical regression.In fact,LMS is a method for fi tting the dataset. The LMS must yield the smallestvalue for the median of squared residuals computed for the entire data set.This residuals refer to the difference between realdata and predicted data.

    Gaussian process:In probability theory,the Gaussian process(GP)consists of random values associated with every point in a range of times.The random variable has a normal distribution.In[20],it has been mentioned that“a Gaussian process is a stochastic process whose generalization of a Gaussian distribution overa fi nite vectorspace to a function space of in fi nite dimension”.

    M5P:M5P is a tree learner consisting of a binary decision tree which learns a“model”tree.This is a decision tree with LR functions at the leaves.It is used to predict a numeric target attribute.It may be piecewise fi t to the target[14,21].

    REPtree:REPtree(RT)builds a decision/regression tree using information gain/variance and prunes it using reduced-error pruning(with back fi tting).Only sort values for numeric attributes once.Missing values are dealt with by splitting the corresponding instances into pieces (i.e.as in C4.5)[14].

    Sequential minimal optimization:In[4,22],sequentialminimaloptimization(SMO)was proposed as an iterative algorithm.This algorithm uses supportvectormachine (SVM)forsolving the regression problemand SVMclassifi er design.The SMO algorithm has two worthy aspects: easy implementation and fastcomputationalspeed[23].

    Multilayer perceptron:The multilayer perceptron (MLP)is a very simple model of biological neural networks.The network is structured in a hierarchical way. MLP includessome nodes located in differentlayers where the information fl ows only from one layerto the nextlayer. The fi rst and the last layers are the input and the output. Layers between the input and the output layer are called hidden layers.This network is trained based on back propagation error in that the real outputs are compared with network outputs,and the weights are set using supervised back propagation to achieve the suitable model[24].

    5.Experiment results

    In this section,we comprehensively compare the machine learning algorithms to show which one is more effectiveand has a better accuracy in determining the time to crash under the considered scenarios.

    In scenarios explained in Section 3,the system is considered that crashes when the memory consumed by the system reaches 100%during two measurements.Afterrunning allmentioned scenarios and performing the completing process,each scenario datasetis used to train and compare the algorithms,including LR,SMO,MLP,M5P,LMS, RT and GP.

    As mentioned in Section 3,the completing process has been done by adding the real times to crash to our profi le.For comparing machine learning algorithms,we use the correlation coef fi cients,MAE,RMSE and RAE metrics.After computing each of these performance metrics, we rank the algorithms by computing the mean ranked position of each algorithm in each scenario.Thus,we sum the position of a algorithm in each scenario for an speci fi c metric and obtain the average rank.Based on this value, we rank the algorithms according to each metric of interest.Atthe end,we compute the overallranked position by the same approach.

    Table 2 presents the correlation coef fi cients of each algorithm per scenario.We can state that predicting values by MLP are directly and closely related to training dataset values,compared with otheralgorithms.On the otherside, the GP experiences worth average performance across the scenarios according to the rank.The rank list of the algorithms is as follows considering the four scenarios together:(i)MLP,(ii)M5P,(iii)SMO,(iv)LR,(v)RT,(vi) LMS and(vii)GP.Note that M5P and SMO obtain the same average ranked value across scenarios.For this reason,both are in the second position.

    MAE of each algorithm in each scenario is presented in Table 3.According to the average ranked position across scenarios,MLP offers the best results.Itindicates thatthe MLP algorithm is able to adapt better to different scenarios.The complete average rank listacross the fourscenarios is:(i)MLP,(ii)SMO,(iii)M5P,(iv)LR,(v)RT,(vi) LMS and(vii)GP.

    Table 4 presents the RMSE of each algorithm.The RMSE provides insightaboutthe presence of large errors. Therefore,the presence of a larger RMSE value indicates thatit is more likely to observe large errors(i.e.the difference between the realvalue and the predicted one).Since the goal is to obtain a model to predict the time to crash (or time to resource exhaustion)to trigger the software rejuvenation,we need models with a low probability oflarge errors.The complete average rank list across the four scenarios is:(i)MLP,(ii)M5P,(iii)LR,(iv)SMO,(v)RT,(vi) LMS and(vii)GP.

    Finally,Table 5 presents the RAE of each algorithm in each scenario.The RAE provides the errorpercentage normalized by the realvalue.We observe thatthe RAE is large since none of the algorithms are over 10%.Note that the algorithms are used with their default WEKA parameters. Therefore,itcan be expected thatadjusting the parameters properly of the algorithms these results can be improved signi fi cantly.According to the RAE results,the average rank list is as follows:(i)MLP,(ii)SMO,(iii)M5P,(iv) LR,(v)RT,(vi)LMS and(vii)GP.

    Table 2 Correlation coefficient of each algorithm and scenario under study

    Table 3 MAE of each algorithm and scenario under study

    Table 4 RMSEof each algorithm and scenario under study

    Table 5 RAE of each algorithm and scenario under study

    After analyzing the four performance metrics for all algorithms in four scenarios understudy,we propose to rank the algorithms per scenario,computing the average rank obtained in each performance metric.Then summarize the results per scenario.Finally,we also compute the fi nal rank across scenarios.We can observe that MLP is the best candidate in all scenarios(average rank of the four performance metrics underconsideration).AfterthatSMO presents the second average performance,followed by LR and M5P.On the other side,GP obtains the lastposition in the ranked list,showing its least suitability to predict the time to crash due to aging effects.Finally,Fig.2 presents the comparison between actual and predicted data in scenario 2.According to Fig.3,there is high matching between actualand predicted data by MLP in scenario 2.

    Fig.2 RAE ofeach algorithm and scenario under study

    Fig.3 Comparison between actualand predicted data in scenario 2

    6.Conclusions

    In this paper,we compare differentmachine learning algorithms underdifferentaging scenarios.As memory leakage is the most importantparameter in software aging,we implementa memory leakage injection which statistically injects memory leakage to understudy system equipped with a software rejuvenation technique to examine the accuracy of the technique.Using the memory leakage injection tool as wellas the performance monitoring toolthatis available in Windows 7 OS,we comprehensively compare different machine learning algorithms.Our experimental results show thatMLP obtains the betteroverallperformance among the studied algorithms under the four scenarios considered.As a future work,it would be necessary to compare the algorithms listed in this paper under more complex scenarios and when more complex aging factors are involved in order to study how generalizable are the results presented in this paper.

    [1]I.Koren,C.M.Krishna.Fault tolerant systems.Amsterdam: Elsevier,2007.

    [2]Y.Huang,C.Kintala,N.D.Funton.Software rejuvenation: analysis,module and applications.Proc.of the 25th IEEE International Symposium on Fault Tolerant Computing,1995: 381-390.

    [3]J.A.Lopez,R.Matias,E.Vicente,et al.A comparative experimental study of software rejuvenation overhead.Journal of Performance Evaluation,2013,70(3):231-250.

    [4]S.K.Shevade,S.S.Keerthi,C.Bhattacharyya,etal.Improvements to the SMO algorithm for SVM regression.IEEE Trans. on Neural Networks,2000,11(5):1188-1193.

    [5]K.Vaidyanathan,K.S.Trivedi.A comprehensive model for software rejuvenation.IEEE Trans.on Dependable and Secure Computing,2005,2(2):124-137.

    [6]J.A.Lopez,L.Silva,A.Andrzejak,et al.High-available grid services through the use of virtualized clustering.Proc.of the 8th IEEE/ACM International Conference on Grid Computing, 2007:34-41.

    [7]J.A.Lopez,J.Torres,R.Gavalda.Predicting web server crashes:a case study in comparing prediction algorithms. Proc.of the 34th International Conference on Distributed Computing Systems,2009:264-269.

    [8]J.A.Lopez,L.Belanche,D.R.Avresky.Predicting software anomalies using machine learning techniques.Proc.of the 10th IEEE International Symposium on Network Computing and Applications,2011:163-170.

    [9]R.Matos,J.Araujo,P.Maciel,et al.Software rejuvenation in eucalyptus cloud computing infrastructure:a hybrid method based on multiple thresholds and time series prediction.International Transactions on Systems Science and Applications, 2012(8):1-16.

    [10]J.A.Lopez,A.Bovenzi,J.Li,et al.Software rejuvenation --Do IT&Telco industries use it?Proc.of the 23rd IEEE International Symposium on Software Reliability Engineering Workshops,2012:229-304.

    [11]J.A.Lopez.Proactive software rejuvenation solution for web environments on virtualized platforms.Barcelona,Spain: Polytechnic University of Catalonia,2011.

    [12]J.A.Lopez,J.L.Berral,R.Gavalda,et al.Adaptive on-line software aging prediction based on machine learning.Proc.of the 40th IEEE/IFIP International Conference on Dependable Systems and Networks,2010:497-506.

    [13]A.Andrzejak,L.Silva.Using machine learning for nonintrusive modeling and prediction of software aging.Proc.of the IEEE Network Operations and Management Symposium, 2008:25-32.

    [14]I.H.Witten,F.Eibe.Data mining practical machine learning tools and techniques.Burlington:Elsevier,2005.

    [15]L.Silva,J.Alonso,J.Torres.Using virtualization to improve software rejuvenation.IEEE Trans.on Computers,2009, 58(11):1525-1538.

    [16]M.Grottke,L.Li,K.Vaidyanathan,etal.Analysis of software aging in a Web server.Proc.of IEEE Transactions on Reliability,2006,55(3):411-420.

    [17]L.Li,K.Vaidyanathan,K.S.Trivedi.An approach for estimation of software aging in a web server.Proc.ofthe International Symposium on Empirical Software Engineering,2002: 91-100.

    [18]P.F.Zheng,Q.G.Xu,Y.Qi.An advanced methodology for measuring and characterizing software aging.Proc.ofthe 23rd IEEE International Symposium on Software Reliability Engineering Workshops,2012:253-258.

    [19]Windows Performance Monitor.http://technet.microsoft.com/ en-us/library/cc749249.aspx.

    [20]Y.Wang,I.H.Witten.Intduction model trees for continuous classes.Proc.ofthe European Conference on Machine Learning Poster Papers,1997.

    [21]WEKA 3.6.8.http://www.cs.waikato.ac.nzlmllwekal.

    [22]A.J.Smola,B.Sch¨olkopf.A tutorialon support vector regression.London:Royal Holloway College,1998.

    [23]D.J.C.Mackay.Introduction to Gaussian processes.London: Cambridge University,1998.

    [24]A.Macedo,T.B.Ferreira,R.Matias.The mechanics of memory-related software aging.Proc.of the IEEE International Workshop on Software Aging and Rejuvenation,2010: 1-5.

    Biographies

    Moona Yakhchi received her M.S.degree in computer engineering from the Islam Azad University, Boroujerd,Iran,in 2012.Her current research interests are software rejuvenation and cloud computing.

    E-mail:m.yakhchi@gmail.com

    Javier Alonso received his M.S.degree in computer science in 2004 and Ph.D.degree from the Technical University of Catalonia(UniversitatPolitecnica de Catalunya,UPC)in 2011.From 2006 to 2011, he was an assistant lecturer in the Computer Architecture Department of UPC.From 2011 to 2014,he was a postdoctoral associate in the Electrical and Computer Engineering Department,Duke University.Since 2014,he has been the research manager in the Institute of Applied Sciences on Cybersecurity at University of Leon,Spain.He has published more than 30 papers in premier conferences and journals.He is a member of IEEE.He has also served as a reviewer for IEEE Transactions on Computers,IE EE Transactions on Dependability and Security Computing,Performance Evaluation,and Cluster Computing,and severalinternational conferences.His research interests are dependability,reliability,availability,and performance of computer and communication systems.He has special interests in software dependability and software aging and rejuvenation topics.

    E-mail:javier.alonso@unileon.es

    Mahdi Fazeli received his M.S.and Ph.D.degrees in computer engineering from the Sharif University of Technology,Tehran,Iran,in 2005 and 2011, respectively.He has been with the Department of Computer Engineering,Iran University of Science and Technology(IUST),since 2011,where he is currently an assistant professor.He established the Dependable Systems and Architectures Laboratory (DSALab)atIUST in 2012 and he has chaired the Laboratory since then. He has authored orco-authored more than 40 papers in reputable journals and conferences.His current research interests include reliable issues in VLSIcircuits and emerging technologies,hardware security,dependable embedded systems,low power circuits and systems,fault-tolerant computer architectures,and reliability modeling and evaluation.

    E-mail:m fazeli@iust.ac.ir

    Amir Akhavan Bitaraf received his M.S.degree in software engineering from Islamic Azad University, Broujerd,Iran in 2012.He has been collaborating with Broujerd branch of Sama Technical and Vocational Training College since 2010.He is interested in software engineering,data mining and software fault tolerance,especially software aging and rejuvenation.

    E-mail:bitarafaa@gmail.com

    Ahmad Patooghy received his M.S.and Ph.D.degrees in computer engineering from Sharif University of Technology,Tehran,Iran,in 2005 and 2011, respectively.He is currently an assistance professor at Department of Computer Engineering,Iran University of Science&Technology,Tehran,Iran.He initiated the Dependable Systems and Architectures Laboratory at Iran University of Science and Technology in 2012 and has chaired the Laboratory since then.His research interests include hardware design and test,architectural design of multiand many-core chips,dependability and security evaluation of VLSIcircuits,faultinjection,and analytical modeling.

    E-mail:patooghy@iust.ac.ir

    10.1109/JSEE.2015.00047

    Manuscriptreceived December 27,2013.

    *Corresponding author.

    美女中出高潮动态图| 免费av不卡在线播放| 18禁观看日本| 啦啦啦中文免费视频观看日本| 欧美日韩视频精品一区| 两个人免费观看高清视频| 丰满迷人的少妇在线观看| 国产成人91sexporn| 三级国产精品欧美在线观看| 亚洲成色77777| av线在线观看网站| 国模一区二区三区四区视频| 大片电影免费在线观看免费| 日本色播在线视频| 欧美日韩成人在线一区二区| 亚洲av中文av极速乱| 午夜福利网站1000一区二区三区| 国产精品人妻久久久久久| 欧美丝袜亚洲另类| 亚洲精品第二区| 亚洲婷婷狠狠爱综合网| 国产亚洲欧美精品永久| av福利片在线| 视频在线观看一区二区三区| 交换朋友夫妻互换小说| 香蕉精品网在线| 9色porny在线观看| 欧美另类一区| 少妇人妻久久综合中文| 美女大奶头黄色视频| 日本免费在线观看一区| 熟女av电影| 亚洲美女搞黄在线观看| 精品久久久噜噜| av黄色大香蕉| 久久久精品区二区三区| 好男人视频免费观看在线| 丰满迷人的少妇在线观看| 一级毛片电影观看| 一级片'在线观看视频| 亚洲美女黄色视频免费看| 午夜福利在线观看免费完整高清在| 在线播放无遮挡| 国产日韩欧美亚洲二区| 人妻少妇偷人精品九色| 亚洲国产最新在线播放| 一本久久精品| 亚洲色图综合在线观看| 高清av免费在线| 大码成人一级视频| 亚洲av男天堂| 亚洲天堂av无毛| 国产国语露脸激情在线看| xxx大片免费视频| 欧美另类一区| 亚洲av福利一区| 精品久久蜜臀av无| 亚洲国产精品专区欧美| 街头女战士在线观看网站| 狠狠婷婷综合久久久久久88av| 久久国产精品大桥未久av| 中文字幕人妻丝袜制服| 欧美日韩综合久久久久久| 热99久久久久精品小说推荐| 欧美精品高潮呻吟av久久| 嘟嘟电影网在线观看| 亚洲av免费高清在线观看| 视频中文字幕在线观看| 一本色道久久久久久精品综合| 欧美人与性动交α欧美精品济南到 | 少妇人妻久久综合中文| 国产 一区精品| 久久免费观看电影| 你懂的网址亚洲精品在线观看| 国产欧美亚洲国产| 久久亚洲国产成人精品v| 成年女人在线观看亚洲视频| av黄色大香蕉| 老熟女久久久| 久久久久久久大尺度免费视频| 在现免费观看毛片| 嫩草影院入口| 视频中文字幕在线观看| 久久影院123| 一级片'在线观看视频| 日本vs欧美在线观看视频| 日韩一本色道免费dvd| 你懂的网址亚洲精品在线观看| 色94色欧美一区二区| 亚洲国产精品999| 考比视频在线观看| 亚洲av成人精品一区久久| 精品99又大又爽又粗少妇毛片| 成年人午夜在线观看视频| 亚洲国产精品专区欧美| 插逼视频在线观看| 久久久欧美国产精品| 免费看不卡的av| a级片在线免费高清观看视频| 91精品三级在线观看| kizo精华| 久久久久久久久久成人| 免费大片黄手机在线观看| 亚洲人成网站在线观看播放| 蜜桃在线观看..| 赤兔流量卡办理| 国产成人freesex在线| 国产精品一区二区在线观看99| 久久国产精品大桥未久av| 久久国产精品大桥未久av| 熟女电影av网| 国产精品久久久久久久电影| 日本-黄色视频高清免费观看| 国产白丝娇喘喷水9色精品| 大陆偷拍与自拍| 免费av不卡在线播放| 熟女电影av网| 久久久久久久久久久免费av| 国产一区二区三区综合在线观看 | 日韩精品免费视频一区二区三区 | 免费大片18禁| 精品午夜福利在线看| 久久久久视频综合| 成人国产av品久久久| 国产精品嫩草影院av在线观看| 亚洲成人手机| 久久ye,这里只有精品| 大片电影免费在线观看免费| 欧美少妇被猛烈插入视频| 丰满乱子伦码专区| 色视频在线一区二区三区| av卡一久久| 亚洲国产精品成人久久小说| av不卡在线播放| 最近的中文字幕免费完整| 免费黄网站久久成人精品| 91精品国产九色| 国产69精品久久久久777片| 97精品久久久久久久久久精品| 免费日韩欧美在线观看| 国产黄色视频一区二区在线观看| 王馨瑶露胸无遮挡在线观看| 中文字幕精品免费在线观看视频 | 九色成人免费人妻av| 国产精品一区二区在线不卡| 国产成人免费无遮挡视频| 亚洲综合精品二区| 美女cb高潮喷水在线观看| av在线播放精品| 国产免费视频播放在线视频| 视频中文字幕在线观看| 精品少妇久久久久久888优播| 大香蕉97超碰在线| 性色avwww在线观看| 热re99久久国产66热| 午夜老司机福利剧场| 在线 av 中文字幕| 99久久精品国产国产毛片| 99久久精品国产国产毛片| 热99国产精品久久久久久7| 久久午夜福利片| 狂野欧美激情性xxxx在线观看| 9色porny在线观看| av卡一久久| 国产 精品1| 亚洲国产欧美日韩在线播放| 国产高清三级在线| 少妇被粗大的猛进出69影院 | 视频中文字幕在线观看| 午夜免费鲁丝| 热re99久久国产66热| 在线 av 中文字幕| 丰满饥渴人妻一区二区三| 久热久热在线精品观看| 亚洲av不卡在线观看| 精品99又大又爽又粗少妇毛片| 久久精品国产鲁丝片午夜精品| 一级毛片aaaaaa免费看小| 尾随美女入室| 国产精品久久久久久久电影| 在线观看免费日韩欧美大片 | 午夜免费鲁丝| 久久 成人 亚洲| 能在线免费看毛片的网站| 性色avwww在线观看| 高清av免费在线| 亚州av有码| 日本与韩国留学比较| 欧美人与性动交α欧美精品济南到 | 亚洲熟女精品中文字幕| 欧美精品一区二区免费开放| 七月丁香在线播放| 男女边吃奶边做爰视频| 国精品久久久久久国模美| 日韩亚洲欧美综合| 亚洲精品乱码久久久v下载方式| av视频免费观看在线观看| 99国产综合亚洲精品| 人妻夜夜爽99麻豆av| 午夜av观看不卡| 欧美国产精品一级二级三级| 伦理电影免费视频| 久久精品久久精品一区二区三区| 简卡轻食公司| 熟妇人妻不卡中文字幕| 成人午夜精彩视频在线观看| 色94色欧美一区二区| 久久免费观看电影| 乱码一卡2卡4卡精品| 亚洲欧美成人精品一区二区| 国产成人精品久久久久久| 久久99精品国语久久久| 又大又黄又爽视频免费| 中国三级夫妇交换| 亚洲精品国产色婷婷电影| 亚洲欧美日韩卡通动漫| 水蜜桃什么品种好| 97在线人人人人妻| kizo精华| 你懂的网址亚洲精品在线观看| 日韩伦理黄色片| 久久久精品94久久精品| 亚洲国产精品成人久久小说| 国产无遮挡羞羞视频在线观看| 一区二区日韩欧美中文字幕 | 一二三四中文在线观看免费高清| 国产片特级美女逼逼视频| a级毛色黄片| 超碰97精品在线观看| 中文字幕久久专区| 免费看光身美女| 22中文网久久字幕| 十分钟在线观看高清视频www| 亚洲精品av麻豆狂野| 成人无遮挡网站| 99热全是精品| 国产高清三级在线| 日韩成人伦理影院| 黄色配什么色好看| 91aial.com中文字幕在线观看| 美女xxoo啪啪120秒动态图| 国产精品一区www在线观看| a级毛色黄片| 18禁观看日本| 男人添女人高潮全过程视频| 91精品三级在线观看| 色94色欧美一区二区| 伊人亚洲综合成人网| 99久久中文字幕三级久久日本| 亚洲,一卡二卡三卡| 丰满饥渴人妻一区二区三| 大又大粗又爽又黄少妇毛片口| 国产男女超爽视频在线观看| 亚洲美女黄色视频免费看| 一边亲一边摸免费视频| 午夜福利视频精品| 丰满少妇做爰视频| 水蜜桃什么品种好| 午夜影院在线不卡| 人人妻人人澡人人爽人人夜夜| 日韩一本色道免费dvd| 日韩av免费高清视频| 91精品伊人久久大香线蕉| 婷婷色av中文字幕| 精品一品国产午夜福利视频| 国产男女超爽视频在线观看| 亚洲天堂av无毛| 久久久精品94久久精品| 国内精品宾馆在线| 免费黄频网站在线观看国产| 美女脱内裤让男人舔精品视频| 国产一区二区在线观看日韩| 色哟哟·www| 欧美日韩国产mv在线观看视频| 国产无遮挡羞羞视频在线观看| 欧美精品高潮呻吟av久久| 一个人看视频在线观看www免费| 国产精品久久久久久久电影| 超色免费av| 亚洲精品色激情综合| 日本爱情动作片www.在线观看| 中文乱码字字幕精品一区二区三区| 国产精品蜜桃在线观看| 日本欧美视频一区| videosex国产| 亚洲av国产av综合av卡| 国产精品国产三级国产av玫瑰| 综合色丁香网| 精品人妻熟女av久视频| 97在线人人人人妻| 欧美+日韩+精品| 久久99一区二区三区| 日本wwww免费看| 天美传媒精品一区二区| 性色av一级| 在线播放无遮挡| 日韩av在线免费看完整版不卡| xxx大片免费视频| 欧美日韩国产mv在线观看视频| 伊人久久国产一区二区| 性高湖久久久久久久久免费观看| 少妇丰满av| 最近中文字幕高清免费大全6| 久久久久久久大尺度免费视频| 免费看光身美女| 亚洲欧洲国产日韩| 丰满少妇做爰视频| 涩涩av久久男人的天堂| 在线看a的网站| 国产精品免费大片| 亚洲五月色婷婷综合| 人妻一区二区av| 欧美日韩成人在线一区二区| 18禁在线播放成人免费| 少妇 在线观看| a级片在线免费高清观看视频| av播播在线观看一区| 欧美性感艳星| 久久精品久久久久久久性| 国产日韩欧美在线精品| 久久女婷五月综合色啪小说| 五月玫瑰六月丁香| av不卡在线播放| 久久国产精品男人的天堂亚洲 | av国产久精品久网站免费入址| 韩国av在线不卡| 考比视频在线观看| 欧美精品人与动牲交sv欧美| 午夜久久久在线观看| 丝袜脚勾引网站| 久热这里只有精品99| 久久热精品热| 亚洲av电影在线观看一区二区三区| 蜜桃久久精品国产亚洲av| 免费大片黄手机在线观看| 欧美人与性动交α欧美精品济南到 | 哪个播放器可以免费观看大片| 日韩强制内射视频| 日韩亚洲欧美综合| tube8黄色片| 亚洲经典国产精华液单| 日本色播在线视频| 99九九线精品视频在线观看视频| 欧美日韩av久久| 精品久久久噜噜| 国产熟女欧美一区二区| 日本vs欧美在线观看视频| 黄色毛片三级朝国网站| 欧美3d第一页| 亚洲精品一二三| 一区在线观看完整版| 国精品久久久久久国模美| 成年av动漫网址| 欧美三级亚洲精品| 欧美另类一区| 纯流量卡能插随身wifi吗| 亚洲av二区三区四区| 日本vs欧美在线观看视频| 中文乱码字字幕精品一区二区三区| 人妻一区二区av| 日韩伦理黄色片| 99久国产av精品国产电影| 日韩电影二区| 亚洲精品日韩在线中文字幕| 国产成人av激情在线播放 | 国产成人午夜福利电影在线观看| 大香蕉久久成人网| 亚洲成人手机| 国产日韩欧美在线精品| 最新的欧美精品一区二区| 最近中文字幕高清免费大全6| 亚洲精品乱码久久久v下载方式| 欧美xxⅹ黑人| 亚洲国产精品一区三区| 中文字幕免费在线视频6| 国产av码专区亚洲av| 久久久久久久久大av| 在线免费观看不下载黄p国产| 考比视频在线观看| 欧美日韩在线观看h| 久久午夜福利片| 大又大粗又爽又黄少妇毛片口| 久久久亚洲精品成人影院| 制服人妻中文乱码| 亚洲国产欧美日韩在线播放| 国产av精品麻豆| 啦啦啦在线观看免费高清www| 亚洲精品第二区| 人妻制服诱惑在线中文字幕| 亚洲精品乱久久久久久| 啦啦啦啦在线视频资源| 欧美日本中文国产一区发布| 少妇被粗大猛烈的视频| 男男h啪啪无遮挡| 97在线人人人人妻| 大话2 男鬼变身卡| 国产男女内射视频| 简卡轻食公司| 国产成人午夜福利电影在线观看| 街头女战士在线观看网站| 高清不卡的av网站| 亚洲美女搞黄在线观看| 久久精品人人爽人人爽视色| 一级毛片 在线播放| 一本一本综合久久| 精品视频人人做人人爽| 男女边摸边吃奶| 亚洲欧洲精品一区二区精品久久久 | 肉色欧美久久久久久久蜜桃| 亚洲内射少妇av| 国产精品国产三级国产专区5o| 久久久国产精品麻豆| 黄色怎么调成土黄色| 两个人免费观看高清视频| 七月丁香在线播放| 中文字幕免费在线视频6| 大香蕉久久成人网| 男人爽女人下面视频在线观看| 中国美白少妇内射xxxbb| 国产一区二区在线观看日韩| 国产在视频线精品| 另类亚洲欧美激情| 亚洲av成人精品一二三区| 国产精品熟女久久久久浪| 亚洲欧美成人精品一区二区| 国产伦精品一区二区三区视频9| 亚洲人与动物交配视频| 人人妻人人澡人人爽人人夜夜| 午夜久久久在线观看| 九九爱精品视频在线观看| 天堂中文最新版在线下载| 久久97久久精品| 国产淫语在线视频| 国产一区二区在线观看日韩| 国产精品99久久99久久久不卡 | 男女无遮挡免费网站观看| 日本与韩国留学比较| 一本久久精品| 亚洲精华国产精华液的使用体验| 国产成人91sexporn| 超碰97精品在线观看| 亚洲av日韩在线播放| 国产高清国产精品国产三级| 久热久热在线精品观看| 免费观看av网站的网址| 黑人猛操日本美女一级片| 欧美亚洲日本最大视频资源| 亚洲成色77777| 九色成人免费人妻av| 久热久热在线精品观看| 99视频精品全部免费 在线| 国产亚洲欧美精品永久| 欧美3d第一页| 亚洲中文av在线| 大码成人一级视频| 另类精品久久| 最近中文字幕2019免费版| 亚洲国产精品专区欧美| 美女内射精品一级片tv| 中文字幕久久专区| 欧美日韩在线观看h| 性色avwww在线观看| 日韩在线高清观看一区二区三区| 国产国语露脸激情在线看| 五月天丁香电影| 国产成人一区二区在线| 少妇人妻久久综合中文| 亚洲av不卡在线观看| 亚洲国产欧美日韩在线播放| 一级毛片黄色毛片免费观看视频| 搡老乐熟女国产| 亚洲国产毛片av蜜桃av| 最新中文字幕久久久久| 成年人午夜在线观看视频| 久久鲁丝午夜福利片| 国产国拍精品亚洲av在线观看| 国产日韩欧美亚洲二区| 精品国产乱码久久久久久小说| 亚洲欧美日韩另类电影网站| 成人毛片60女人毛片免费| 色视频在线一区二区三区| 少妇被粗大的猛进出69影院 | 人妻 亚洲 视频| 九九久久精品国产亚洲av麻豆| 青春草国产在线视频| av.在线天堂| 亚洲,一卡二卡三卡| 国产精品国产av在线观看| 777米奇影视久久| 乱码一卡2卡4卡精品| 欧美人与性动交α欧美精品济南到 | 热re99久久国产66热| 国产在线视频一区二区| 狂野欧美激情性xxxx在线观看| 又黄又爽又刺激的免费视频.| 日本wwww免费看| 久久久久久久大尺度免费视频| 成年美女黄网站色视频大全免费 | 97超碰精品成人国产| 黑人高潮一二区| 内地一区二区视频在线| 这个男人来自地球电影免费观看 | 中文乱码字字幕精品一区二区三区| 国产成人精品福利久久| 青青草视频在线视频观看| 国产成人午夜福利电影在线观看| 精品久久蜜臀av无| 亚洲精品一区蜜桃| 少妇丰满av| 久久久久久久大尺度免费视频| 欧美精品一区二区大全| 美女cb高潮喷水在线观看| 人妻制服诱惑在线中文字幕| 亚洲欧洲日产国产| 91成人精品电影| 婷婷色麻豆天堂久久| 在现免费观看毛片| 亚洲成人av在线免费| 久久精品久久精品一区二区三区| av视频免费观看在线观看| 亚洲精品乱久久久久久| 久久精品国产a三级三级三级| av免费观看日本| 天堂俺去俺来也www色官网| 欧美xxⅹ黑人| 99九九在线精品视频| 国产成人freesex在线| 中文字幕最新亚洲高清| 国产免费又黄又爽又色| 精品久久久久久久久亚洲| 亚洲欧美日韩另类电影网站| 肉色欧美久久久久久久蜜桃| 国产av国产精品国产| 国产不卡av网站在线观看| 777米奇影视久久| 国产乱人偷精品视频| 美女主播在线视频| 国产日韩欧美视频二区| 亚洲av日韩在线播放| 午夜91福利影院| 亚洲在久久综合| av一本久久久久| 在线观看免费视频网站a站| 亚洲综合色网址| 又黄又爽又刺激的免费视频.| 亚洲综合色惰| 国产乱人偷精品视频| 日本wwww免费看| 国产欧美日韩一区二区三区在线 | 人妻人人澡人人爽人人| 亚洲无线观看免费| 一区二区av电影网| 嘟嘟电影网在线观看| 亚洲精品自拍成人| 亚洲,一卡二卡三卡| 久久久精品免费免费高清| 自拍欧美九色日韩亚洲蝌蚪91| 一级爰片在线观看| 中国三级夫妇交换| 久久精品国产鲁丝片午夜精品| 精品一区二区免费观看| 久久精品国产a三级三级三级| 国产伦精品一区二区三区视频9| 中文字幕亚洲精品专区| 亚洲美女黄色视频免费看| 久久久久网色| 一级毛片黄色毛片免费观看视频| 日韩欧美精品免费久久| 国产免费现黄频在线看| 日日爽夜夜爽网站| 久久精品国产亚洲av涩爱| 国产精品女同一区二区软件| 国产毛片在线视频| 国产成人av激情在线播放 | 久久久久精品性色| 全区人妻精品视频| videossex国产| 日韩熟女老妇一区二区性免费视频| 人人妻人人添人人爽欧美一区卜| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 最近手机中文字幕大全| 少妇被粗大的猛进出69影院 | 国产成人精品在线电影| 美女内射精品一级片tv| 你懂的网址亚洲精品在线观看| 在现免费观看毛片| 久久免费观看电影| 99热全是精品| 欧美人与性动交α欧美精品济南到 | 99热这里只有是精品在线观看| 日产精品乱码卡一卡2卡三| 久久久久网色| 高清黄色对白视频在线免费看| 夜夜骑夜夜射夜夜干| av.在线天堂| 国产老妇伦熟女老妇高清| 成人毛片a级毛片在线播放| 亚洲国产精品成人久久小说| 纵有疾风起免费观看全集完整版| 久久久久网色| 久久久久久久久久久久大奶| 午夜激情福利司机影院| 18在线观看网站| 成人二区视频| 国产熟女午夜一区二区三区 | 久久久久久久久久久久大奶| 午夜激情av网站| 一级,二级,三级黄色视频| 97精品久久久久久久久久精品| 天天躁夜夜躁狠狠久久av| 少妇 在线观看| 欧美亚洲 丝袜 人妻 在线| 麻豆乱淫一区二区| 大香蕉久久成人网| 嘟嘟电影网在线观看|