Fumio Machida

ORCID: 0000-0001-8359-8535
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • Software System Performance and Reliability
  • Software Reliability and Analysis Research
  • Distributed systems and fault tolerance
  • IoT and Edge/Fog Computing
  • Advanced Software Engineering Methodologies
  • Advanced Data Storage Technologies
  • Distributed and Parallel Computing Systems
  • Software-Defined Networks and 5G
  • Advanced Queuing Theory Analysis
  • Reliability and Maintenance Optimization
  • Risk and Safety Analysis
  • Caching and Content Delivery
  • Real-Time Systems Scheduling
  • Safety Systems Engineering in Autonomy
  • Service-Oriented Architecture and Web Services
  • Fault Detection and Control Systems
  • Parallel Computing and Optimization Techniques
  • Adversarial Robustness in Machine Learning
  • Radiation Effects in Electronics
  • Software Testing and Debugging Techniques
  • Formal Methods in Verification
  • Business Process Modeling and Analysis
  • Anomaly Detection Techniques and Applications
  • Machine Learning and Data Classification

University of Tsukuba
2019-2024

Laboratoire d'Informatique de Paris-Nord
2021

The University of Western Australia
2020

Deakin University
2020

Tokyo Institute of Technology
2015-2017

NEC (Japan)
2008-2017

Duke University
2011-2012

This paper develops an availability model of a virtualized system. We construct non-virtualized and two hosts system models using two-level hierarchical approach in which fault trees are used the upper level homogeneous continuous time Markov chains (CTMC) to represent sub-models lower level. In models, we incorporate not only hardware failures (e.g., CPU, memory, power, etc) but also software including Virtual Machine Monitor (VMM), (VM), application failures. high (HA) service VM live...

10.1109/prdc.2009.64 article EN 2009-11-01

Consolidated server systems using virtualization involves serious risks of host failures that induce unexpected downs all hosted virtual machines and applications. To protect applications requiring high-availability from unpredictable failures, redundant configuration can be an effective countermeasure. This paper presents a machine placement method for establishing against with less servers. The proposed estimates the requisite minimum number according to performance requirements...

10.1109/noms.2010.5488431 article EN 2010-01-01

As server virtualization is used as an essential software infrastructure of various services such cloud computing, availability management virtualized system becoming more significant. Although time-based rejuvenation useful to postpone/prevent failures due aging in a system, the schedules for virtual machine (VM) and monitor (VMM) need be determined proper way VM availability, since VMM affects VMs running on VMM. This paper presents analytic models using stochastic reward nets three...

10.1109/wosar.2010.5722098 article EN 2010-11-01

Server virtualization is a technology used in many enterprise systems to reduce operation and acquisition costs, increase the availability of their critical services. Virtualized may be even more complex than traditional nonvirtualized systems; thus, quantitative assessment system difficult. In this paper, we propose sensitivity analysis approach find parameters that deserve attention for improving systems. Our based on Markov reward models, suggests host failure rate most important...

10.1109/tr.2012.2220711 article EN IEEE Transactions on Reliability 2012-10-05

High-availability assurance of cloud service is a critical and challenging issue for providers. To quantify the availability services from both architectural operational points views, modeling evaluation are essential. This paper presents component-based framework, named Candy, which constructs comprehensive model semi-automatically system specifications described by Systems Modeling Language (SysML). SysML diagrams translated into components assembled together to form entire in Stochastic...

10.1109/srds.2011.33 article EN 2011-10-01

The Multi-access Edge Computing (MEC) and Network Function Virtualization (NFV) integrated architecture is a key enabling platform for 5G to run multiple customized services in the form of service function chain (SFC) configured as an ordered set functions (SFs). However, memory-related software aging SF that can be exploited by attackers becomes new threat dependability MEC-SFC services. To provide dependable services, proactive rejuvenation techniques counteract problem are essential. In...

10.1109/tdsc.2022.3150782 article EN IEEE Transactions on Dependable and Secure Computing 2022-02-15

This article analyzes the completion time of a job running on virtualized server subject to software aging and rejuvenation in virtual machine monitor (VMM). A may be interrupted by (VM) failure, VMM failure or rejuvenation. The interruption is categorized as either preemptive-repeat ( prt ), which case needs restart from beginning, preemptive-resume prs resumes execution point interruption. Using semi-Markov process (SMP) model behavior, steady-state availability computed theory developed...

10.1145/2539121 article EN ACM Journal on Emerging Technologies in Computing Systems 2014-01-01

Software aging is a phenomenon of progressive degradation software execution environment caused by faults. In this paper, we propose life-extension as an operational countermeasure against and present the mathematical foundations means stochastic modeling. A semi-Markov process used to capture behavior system with analyze system's availability completion times jobs running on it. The can correctly model time-based allows us derive optimal trigger for starting in terms mean job time. We also...

10.1109/tr.2016.2615880 article EN IEEE Transactions on Reliability 2016-10-26

Cloud computing is established on advanced software technologies intended to enhance the scalability of infrastructure by making full use commodity servers. The more cloud relies technologies, bugs have significant impacts system availability. Aging-related bugs, which cause accumulation errors in long time execution, often remain even after release a stable version software. This paper investigates bug reports five major open-source projects related and confirms issues about existence...

10.1109/issrew.2012.97 article EN 2012-11-01

Network Function Virtualization (NFV) enables network operators to utilize a common substrate for offering different networking services flexibly and dynamically in the form of service chains. A chain NFV consists set Virtualized Functions (VNFs) that are interconnected through logical service. VNFs usually implemented on top virtual machines hosted commodity hardware with reliabilities. Ensuring end-to-end reliability is crucial providing highly-available In this paper, we propose embedding...

10.1109/nfv-sdn.2017.8169853 article EN 2017-11-01

Software aging (i.e. progressive performance degradation of long-running software systems) is difficult to detect due the long latency until it manifests during program execution. Fast and accurate detection important for eliminating underlying defects already development testing. Also in a deployment scenario, needed plan mitigation methods like rejuvenation. The goal this paper evaluate whether Mann-Kendall test an effective approach detecting from traces computer system metrics. This...

10.1109/issrew.2013.6688905 article EN 2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) 2013-11-01

Image classifiers for recognizing real-world objects are widely used in the Internet of Things (IoT) and Cyber-Physical Systems(CPSs). A classifier is trained offline by machine learning algorithms with training data sets, then it deployed on a cloud or an edge computing system online label predictions. As classifier's performance depends underlying software infrastructure, may degrade over time due to faults causing aging. In this paper, we address issue experimentally investigate aging...

10.1109/tdsc.2021.3139201 article EN IEEE Transactions on Dependable and Secure Computing 2021-12-29

Software systems running continuously for a long time often confront software aging, which is the phenomenon of progressive degradation execution environment caused by latent faults. Removal such faults in development process crucial issue system reliability. A known major obstacle typically large latency to discover existence aging. We propose systematic approach detect aging has shorter test and higher accuracy compared traditional detection via stress testing trend with high confidence....

10.1109/srds.2014.38 article EN 2014-10-01

Virtualization technology has promoted the fast development and deployment of cloud computing, is now becoming an enabler Internet Everything. Virtual machine monitor (VMM), playing a critical role in virtualized system, software hence it suffers from aging after long continuous running as well crashes due to elusive faults. Software rejuvenation techniques can be adopted reduce impact aging. Although there existed analytical model-based approaches for evaluating techniques, none analyzed...

10.1109/access.2019.2963397 article EN cc-by IEEE Access 2020-01-01

This paper addresses the coverage (including identification and isolation) of irrelevant components in systems with imperfect fault (IFC). In fault-tolerant systems, a single not-covered component may thwart automatic recovery mechanisms, lead to system or subsystem failure. The models that consider effects IFC are known as (CMs). traditional CMs, except those considering functional dependency (a similar concept relevancy but different assumptions semantics), is typically limited faulty...

10.1109/tr.2014.2363155 article EN IEEE Transactions on Reliability 2014-10-22

In modern IT systems, data backup and restore operations are essential for providing protection against loss from both natural man-made incidents. On the other hand, can be resource-intensive lead to performance degradation, or may require system offline entirely. Therefore, it is important properly choose techniques policies ensure adequate while minimizing impact on availability performance. this paper, we present an analytical modeling approach such a purpose. We study file service that...

10.1109/tdsc.2013.50 article EN IEEE Transactions on Dependable and Secure Computing 2014-01-31

Virtualization enables data centers to consolidate servers improve resource utilization and power consumption. This paper presents the issues of performability management in a virtualized center that hosts multiple services using virtualization. One main cause degradation is software aging both virtual machines (VMs) machine monitor (VMM) Virtualized Data Center (VDC). Software rejuvenation cost effective proactive method counteract aging. During operations, there occurs down time,...

10.1109/issrew.2008.5355515 article EN 2008-11-01

This paper presents a high-availability solution to virtualized data center which consists of cluster physical servers and hosted virtual machines (VMs). VMs are typically generated through software called machine monitor (VMM) running on servers. Both VMMs face the risks aging caused by aging-related bugs in may result failures long time execution. To prevent such proactively, we propose combined server rejuvenation technique that performs VM rejuvenations simultaneously with VMM...

10.1109/uic-atc.2012.52 article EN 2012-09-01

This paper presents a performability model for RAID storage systems using Markov regenerative process to compare different architectures. While homogeneous models are extensively used reliability analysis of systems, the memory-less property sojourn time assumed in such is not satisfied reality, especially disk rebuild whose progress interrupted even at an event another failure. In this paper, we use which allows us generally distributed times providing needed extension traditional models....

10.1109/tdsc.2015.2502240 article EN IEEE Transactions on Dependable and Secure Computing 2015-12-10

<italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">M</i> ulti-access xmlns:xlink="http://www.w3.org/1999/xlink">e</i> dge xmlns:xlink="http://www.w3.org/1999/xlink">c</i> omputing (MEC)-enabled xmlns:xlink="http://www.w3.org/1999/xlink">I</i> nternet xmlns:xlink="http://www.w3.org/1999/xlink">o</i> f xmlns:xlink="http://www.w3.org/1999/xlink">T</i> hings (IoT) is considered as a promising paradigm to deliver computation-intensive and...

10.1109/tsc.2023.3241430 article EN IEEE Transactions on Services Computing 2023-02-01

Virtual machine monitor (VMM) rejuvenation is a proactive recovery method against failures caused by software aging in VMM. Since the job running on hosted virtual (VM) interrupted at VMM rejuvenation, preemption type of important for performance execution. In preemptive repeat (prt), needs to restart after recovery. resume (prs), can execution from point. this paper, we analyze completion time virtualized server subject and prt case or prs case. The theory developed [1] used obtain...

10.1109/wosar.2011.10 article EN 2011-11-01
Coming Soon ...