By Topic

IEEE Transactions on Reliability

Issue 1 • Date March 2003

Filter Results

Displaying Results 1 - 25 of 26
  • Editorial reasonable engineering guess

    Publication Year: 2003, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (144 KB) | HTML iconHTML
    Freely Available from IEEE
  • Editorial genuine imitation Bayesian

    Publication Year: 2003, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (138 KB) | HTML iconHTML
    Freely Available from IEEE
  • Editorial confidence intervals for discrete variables

    Publication Year: 2003, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (142 KB) | HTML iconHTML
    Freely Available from IEEE
  • Commentary: the Khamis/Higgins model

    Publication Year: 2003, Page(s):4 - 6
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (258 KB) | HTML iconHTML

    This paper shows that the 'KH model' proposed by Khamis & Higgins (see ibid., vol.47, p.131-4, 1998) is not a new model but is a special case of the multiple step-stress TFR model for Weibull distributions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Commentary: failure-rate functions for doubly-truncated random variables

    Publication Year: 2003, Page(s):7 - 8
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    Navarro and Ruiz (see ibid., vol.45, p.685-90, 1996) express the nonparametric maximum likelihood estimator (NPMLE) of the distribution of a failure-time random variable as a function of the NPMLE of generalized failure-rate functions. These generalized failure-rate functions are equal to the probability density functions of a doubly-truncated failure-time random variable at the endpoints of the t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Commentary: author reply to a book review

    Publication Year: 2003, Page(s): 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (137 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Commentary: getting real about reliability, through wit and humor

    Publication Year: 2003, Page(s):10 - 13
    Request permission for commercial reuse | PDF file iconPDF (169 KB) | HTML iconHTML
    Freely Available from IEEE
  • Tubulation techniques for locating fine-leak sites in hermetic electronic packages

    Publication Year: 2003, Page(s):130 - 132
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (302 KB) | HTML iconHTML

    Bubble testing is often regarded, at best, as a poor method for locating gross leaks. However, it is demonstrated that, under proper conditions, bubble testing can be used to detect both gross and fine leaks, as well as their precise locations. Although not applicable in all situations, these leak-tests offer rapid and effective methods for identifying leak locations in components that are not adv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A critical look at the bathtub curve

    Publication Year: 2003, Page(s):125 - 129
    Cited by:  Papers (57)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (278 KB) | HTML iconHTML

    This paper addresses some of the fundamental assumptions underlying the bathtub curve. It is shown to be unlikely that any practical hazard function is decreasing near zero. Great care should be taken in interpreting the hazard function, particularly in applying quality-control practices, such as burn-in or environmental-stress-screening to manufactured products. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testing the untestable: reliability in the 21st century

    Publication Year: 2003, Page(s):118 - 124
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (223 KB) | HTML iconHTML

    As science and technology become increasingly sophisticated, government and industry are relying more and more on science's advanced methods to determine reliability. Unfortunately, political, economic, time, and other constraints imposed by the real world, inhibit the ability of researchers to calculate reliability efficiently and accurately. Because of such constraints, reliability must undergo ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The use of game theory to measure the vulnerability of stochastic networks

    Publication Year: 2003, Page(s):63 - 68
    Cited by:  Papers (34)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (327 KB) | HTML iconHTML

    Conventional approaches to network reliability analysis are based on either connectivity or capacity. This paper proposes an alternative method which seeks to identify those links or nodes whose failure would impair network performance the most. It is assumed that all links have two costs, a normal cost and a failed cost, both of which can be traffic-dependent. A 2-player, noncooperative, zero-sum... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental evaluation of error-detection mechanisms

    Publication Year: 2003, Page(s):53 - 57
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    Effective error-detection is paramount for building highly dependable computing systems. A new methodology, based on physical and simulated fault injection, has been developed for assessing the effectiveness of error-detection mechanisms. This approach has 2 steps: (1) transient faults are physically injected at the IC pin level of a prototype, in order to derive the error-detection coverage. Expe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Joint optimization of block-replacement and periodic-review spare-provisioning policy

    Publication Year: 2003, Page(s):112 - 117
    Cited by:  Papers (33)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (367 KB) | HTML iconHTML

    This paper considers the problem of joint optimization of "preventive maintenance" and "spare-provisioning policy" for system components subject to wear-out failures. A stochastic mathematical model is developed to determine the jointly optimal "block replacement" and "periodic review spare-provisioning policy." The objective function of the model represents the s-expected total cost of system mai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical composition and aggregation of state-based availability and performability models

    Publication Year: 2003, Page(s):44 - 52
    Cited by:  Papers (33)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (466 KB) | HTML iconHTML

    Telecommunication systems are large and complex, consisting of multiple intelligent modules in shelves, multiple shelves in frames, and multiple frames to compose a single network element. In the availability and performability analysis of such a complex system, combinatorial models are computationally efficient but have limited expressive power. State-based models are expressive but computational... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A unified way of comparing the reliability of coherent systems

    Publication Year: 2003, Page(s):38 - 43
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (594 KB) | HTML iconHTML

    Consider a coherent system S hat has n nodes and a structure function φ. The state of S is determined by the "states of the components allocated at the n nodes" and φ. If the reliabilities of these it components are expressed by an n-dimensional vector p, then the reliability of S is a function of p. Using the concepts of node-criticality introduced by Boland et al. (1989), the main theore... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability allocation through cost minimization

    Publication Year: 2003, Page(s):106 - 111
    Cited by:  Papers (80)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (490 KB) | HTML iconHTML

    This paper considers the allocation of reliability and redundancy to parallel-series systems, while minimizing the cost of the system. It is proven that under usual conditions satisfied by cost functions, a necessary condition for optimal reliability allocation of parallel-series systems is that the reliability of the redundant components of a given subsystem are identical. An optimal algorithm is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A modified Weibull distribution

    Publication Year: 2003, Page(s):33 - 37
    Cited by:  Papers (135)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    A new lifetime distribution capable of modeling a bathtub-shaped hazard-rate function is proposed. The proposed model is derived as a limiting case of the Beta Integrated Model and has both the Weibull distribution and Type 1 extreme value distribution as special cases. The model can be considered as another useful 3-parameter generalization of the Weibull distribution. An advantage of the model i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Indirect assessment of system reliability

    Publication Year: 2003, Page(s):58 - 62
    Cited by:  Papers (5)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (381 KB) | HTML iconHTML

    Assessing system-reliability has been a major goal of many people in many walks of life, including those that develop and deploy systems. For that purpose many methods and techniques have been published. However, most of these techniques and methods rely heavily on failure data. Because the design of high-reliability systems generally requires that the individual system components have extremely h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A general repair, proportional-hazards, framework to model complex repairable systems

    Publication Year: 2003, Page(s):26 - 32
    Cited by:  Papers (47)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (395 KB) | HTML iconHTML

    A system (machine) is observed to operate in 1 of 2 modes. The most common mode is loaded (or regular) operation. Occasionally the system is placed in an unloaded state, wherein while the system is mechanically still operating, it is assumed that the failure intensity is lower due to this reduction in operating intensity. A proportional hazards framework is used to capture this potential reduction... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance utility-analysis of multi-state systems

    Publication Year: 2003, Page(s):14 - 21
    Cited by:  Papers (32)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (510 KB) | HTML iconHTML

    This paper defines a new utility importance of a state of a component in multi-state systems. This utility importance overcomes some drawbacks of a well-known importance measure suggested by William S. Griffith (J. Applied Probability, 1980). The relationship between this new utility importance and the Griffith importance is studied and their difference is illustrated with examples. The contributi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer intrusion detection through EWMA for autocorrelated and uncorrelated data

    Publication Year: 2003, Page(s):75 - 82
    Cited by:  Papers (41)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    Reliability and quality of service from information systems has been threatened by cyber intrusions. To protect information systems from intrusions and thus assure reliability and quality of service, it is highly desirable to develop techniques that detect intrusions. Many intrusions manifest in anomalous changes in intensity of events occurring in information systems. In this study, we apply, tes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simple goodness-of-fit test for the power-law process, based on the Duane plot

    Publication Year: 2003, Page(s):69 - 74
    Cited by:  Papers (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (477 KB) | HTML iconHTML

    The PLP (power-law process) or the Duane model is a simple model that can be used for both reliability growth and reliability deterioration. GOF (goodness-of-fit) tests for the PLP have attracted much attention. However, the practical use of the PLP model is its graphical analysis or the Duane plot, which is a log-log plot of the cumulative number of failures versus time. This has been commonly us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A geometric-process maintenance model for a deteriorating system under a random environment

    Publication Year: 2003, Page(s):83 - 89
    Cited by:  Papers (39)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (457 KB) | HTML iconHTML

    This paper studies a geometric-process maintenance-model for a deteriorating system under a random environment. Assume that the number of random shocks, up to time t, produced by the random environment forms a counting process. Whenever a random shock arrives, the system operating time is reduced. The successive reductions in the system operating time are statistically independent and identically ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maximum-shortest-path (MSP) is not optimal for a general N × N torus

    Publication Year: 2003, Page(s):22 - 25
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    A shortest-path routing is optimal if it maximizes the probability of reaching the destination from a given source, assuming that each link in the system has a given failure probability. An approximation for the shortest-path routing policy, maximum-shortest-path (MSP) routing was proposed by Wu (see ibid., vol.48, no.3, p.247-55, 1999). Wu shows that: MSP is optimal in the mesh and hypercube netw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new methodology to handle Boolean models with loops

    Publication Year: 2003, Page(s):96 - 105
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (551 KB) | HTML iconHTML

    It is often convenient, in reliability analyses, to describe the system under study by means of a set of Boolean equations. Fault trees can be seen as hierarchical sets of Boolean equations. In some cases, the model contains loops, because the system embeds at least two components whose states depend on one another. Reliability networks are a typical example of looped models. Classical fault tree ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Transactions on Reliability is concerned with the problems involved in attaining reliability, maintaining it through the life of the system or device, and measuring it.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
W. Eric Wong
University of Texas at Dallas
Advanced Res Ctr for Software Testing and Quality Assurance

ewong@utdallas.edu