Scheduled System Maintenance
On Wednesday, December 20, IEEE Xplore will undergo scheduled maintenance from 1:00-5:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

IEEE Transactions on Reliability

Issue 3 • Sept. 2004

Filter Results

Displaying Results 1 - 24 of 24
  • Table of contents

    Publication Year: 2004, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • IEEE Transactions on Reliability publication information

    Publication Year: 2004, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • An intrinsic order criterion to evaluate large, complex fault trees

    Publication Year: 2004, Page(s):297 - 305
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    A new efficient algorithm is introduced to evaluate (non) coherent fault trees, obtaining exact lower & upper bounds on system unavailability, with a prespecified maximum error. The algorithm is based on the canonical normal form of the Boolean function, but overcomes the large number of terms needed, by using an intrinsic order criterion (IOC) to select the elementary states to evaluate. This int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Age replacement of components during IFR delay time

    Publication Year: 2004, Page(s):306 - 312
    Cited by:  Papers (18)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    This paper proposes two alternative policies for preventive replacement of a component, which shows sign of occurrence of a fault, and operates for some random time with degraded performance, before its final failure. The time between fault occurrence and component failure is termed as delay time. The first policy, namely age replacement during delay time policy (ARDTP), recommends replacement of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Active-redundancy allocation in systems

    Publication Year: 2004, Page(s):313 - 318
    Cited by:  Papers (33)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    An effective way of improving the reliability of a system is the allocation of active redundancies. Let X1, X2 be s-independent lifetimes of the components C1 and C2, respectively, which form a series system. Let us denote U1 = min(max(X1,X),X2) and U2 = min(X1, max(X2, X)), where X is the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A taxonomy for software voting algorithms used in safety-critical systems

    Publication Year: 2004, Page(s):319 - 328
    Cited by:  Papers (58)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    Voting algorithms are used to provide an error masking capability in a wide range of highly dependable commercial & research applications. These applications include N-Modular Redundant hardware systems and diversely designed software systems based on N-Version Programming. The most sophisticated & complex algorithms can even tolerate malicious (or Byzantine) subsystem errors. The algorithms can b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying generic timing tests for distributed multimedia software systems

    Publication Year: 2004, Page(s):329 - 341
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB) | HTML iconHTML

    With recent advances in network technologies and computing power, multimedia systems have become a popular means for information delivery. However, testing of these systems is difficult. Due to incomplete control of their runtime and communication environment, precise temporal properties of multimedia systems are nonreproducible. Traditional software testing, which mainly deals with functional cor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TMR voting in the presence of crosstalk faults at the voter inputs

    Publication Year: 2004, Page(s):342 - 348
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    In high reliability systems, the effectiveness of fault tolerant techniques, such as Triple-Modular-Redundancy (TMR), must be validated with respect to the faults that are likely in the current technology. In todays' Integrated Circuits (IC), this is the case of crosstalks, whose importance is growing because of device & interconnect scaling. This paper analyzes the problem of crosstalk faults at ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Goodness-of-fit tests based on spacings for progressively type-II censored data from a general location-scale distribution

    Publication Year: 2004, Page(s):349 - 356
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB) | HTML iconHTML

    There has been extensive research on goodness-of-fit procedures for testing whether or not a sample comes from a specified distribution. These goodness-of-fit tests range from graphical techniques, to tests which exploit characterization results for the specified underlying model. In this article, we propose a goodness-of-fit test for the location-scale family based on progressively Type-II censor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Goodness-of-fit tests based on Kullback-Leibler information

    Publication Year: 2004, Page(s):357 - 361
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    We evaluate the power of the sample entropy goodness-of-fit tests for s-normal, exponential, and uniform distributions. We compare them with the mainstream statistical tests, the W test based on the best linear unbiased estimator (BLUE) of the location parameter, the Z test based on the sample spacings, and the R test based on the correlation coefficient between the order statistics of the sample ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dominant multi-state systems

    Publication Year: 2004, Page(s):362 - 368
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    In this paper, we propose a definition of the dominant multi-state system. Under the proposed definition, multi-state systems are divided into two groups without reference to component relevancy conditions: dominant systems, and nondominant systems. Dominant systems can be further divided into two groups: with binary image, and without binary image. A multi-state system with binary image implies t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System optimization with component reliability estimation uncertainty: a multi-criteria approach

    Publication Year: 2004, Page(s):369 - 380
    Cited by:  Papers (53)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB) | HTML iconHTML

    Summary & Conclusions-This paper addresses system reliability optimization when component reliability estimates are treated as random variables with estimation uncertainty. System reliability optimization algorithms generally assume that component reliability values are known exactly, i.e., they are deterministic. In practice, that is rarely the case. For risk-averse system design, the estimation ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability of a stochastic-flow network with unreliable branches & nodes, under budget constraints

    Publication Year: 2004, Page(s):381 - 387
    Cited by:  Papers (71)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    System reliability evaluation for flow networks is an important issue in quality management. This paper concentrates on a stochastic-flow network in which nodes as well as branches have several possible capacities, and can fail. The possibility is evaluated that a given amount of messages can be transmitted through the stochastic-flow network under the budget constraint. Such a possibility, system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal step-stress test under progressive type-I censoring

    Publication Year: 2004, Page(s):388 - 393
    Cited by:  Papers (68)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    We consider in this work a k-step-stress accelerated test with equal duration steps τ. Censoring is allowed at each change stress point iτ, i=1,...k. The problem of choosing the optimal τ is addressed using variance optimality as well as determinant-optimality criteria. We investigate in detail the case of progressively Type-I right censored data with a single stress variable. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Consecutive k-out-of-r-from-n system with multiple failure criteria

    Publication Year: 2004, Page(s):394 - 400
    Cited by:  Papers (28)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    This paper proposes a new model which generalizes the linear consecutive k-out-of-r-from-n system to the case of multiple failure criteria. In this model, the system consists of n linearly ordered elements, and fails iff in any group of r1,...,rH consecutive elements less than k1,...,kH elements respectively are in a working state. An algorithm for syste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specifying interdependence in networked systems

    Publication Year: 2004, Page(s):401 - 405
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    Realistic assessments of the reliability of networked systems, series and parallel systems being special cases, require that we account for interdependence between the component life-lengths. The key to doing this is the specification and use of a suitable probability model in two or more dimensions. Consequently, several multivariate probabilistic models have been proposed in the literature. Many... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability optimization models for embedded systems with multiple applications

    Publication Year: 2004, Page(s):406 - 416
    Cited by:  Papers (34)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB) | HTML iconHTML

    Summary and Conclusions-This paper presents four models for optimizing the reliability of embedded systems considering both software and hardware reliability under cost constraints, and one model to optimize system cost under multiple reliability constraints. Previously, most optimization models have been developed for hardware-only or software-only systems by assuming the hardware, if any, has pe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ant colony optimization algorithm for the redundancy allocation problem (RAP)

    Publication Year: 2004, Page(s):417 - 423
    Cited by:  Papers (177)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    This paper uses an ant colony meta-heuristic optimization method to solve the redundancy allocation problem (RAP). The RAP is a well known NP-hard problem which has been the subject of much prior work, generally in a restricted form where each subsystem must consist of identical components in parallel to make computations tractable. Meta-heuristic methods overcome this limitation, and offer a prac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal reliability/availability of uncertain systems via multi-objective genetic algorithms

    Publication Year: 2004, Page(s):424 - 434
    Cited by:  Papers (36)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB) | HTML iconHTML

    The determination of optimal Surveillance Test Intervals (STI) is a matter of great importance in risk-informed applications, due both to the implications that maintenance actions have on the safety of the risky plants such as the nuclear ones, and to the important amount of resources invested in maintenance operations by the industrial organizations. The common approach to determining the optimal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Minimizing cost-functions related to both burn-in and field-operation under a generalized model

    Publication Year: 2004, Page(s):435 - 439
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    Summary and Conclusions-Burn-in is a method used to improve the quality of products. In field operation, only those units which survived the burn-in procedure will be used. This paper considers various additive cost structures related to both burn-in procedure and field operation under a general failure model. The general failure model includes two types of failures. Type I (minor) failure is remo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Erratum

    Publication Year: 2004, Page(s): 440
    Request permission for commercial reuse | PDF file iconPDF (38 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Erratum

    Publication Year: 2004, Page(s): 440
    Request permission for commercial reuse | PDF file iconPDF (38 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Transactions on Reliability information for authors

    Publication Year: 2004, Page(s):441 - 442
    Request permission for commercial reuse | PDF file iconPDF (51 KB)
    Freely Available from IEEE
  • IEEE copyright form

    Publication Year: 2004, Page(s):443 - 444
    Request permission for commercial reuse | PDF file iconPDF (1058 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Transactions on Reliability is concerned with the problems involved in attaining reliability, maintaining it through the life of the system or device, and measuring it.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
W. Eric Wong
University of Texas at Dallas
Advanced Res Ctr for Software Testing and Quality Assurance

ewong@utdallas.edu