By Topic

# IEEE Transactions on Reliability

## Filter Results

Displaying Results 1 - 25 of 31

Publication Year: 2008, Page(s):C1 - 1
| PDF (42 KB)
• ### IEEE Transactions on Reliability publication information

Publication Year: 2008, Page(s): C2
| PDF (33 KB)
• ### An Application of the EM Algorithm to Degradation Modeling

Publication Year: 2008, Page(s):2 - 13
Cited by:  Papers (12)  |  Patents (1)
| | PDF (382 KB) | HTML

We consider a class of degradation processes that can consist of distinct phases of behavior. In particular, the degradation rates could possibly increase or decrease in a non-smooth manner at some point in time when the underlying degradation process changes phase. To model the degradation path of a given device, we use an independent-increments stochastic process with a single unobserved change-... View full abstract»

• ### Application of Vulnerability Discovery Models to Major Operating Systems

Publication Year: 2008, Page(s):14 - 22
Cited by:  Papers (35)
| | PDF (422 KB) | HTML

A number of security vulnerabilities have been reported in the Windows, and Linux operating systems. Both the developers, and users of operating systems have to utilize significant resources to evaluate, and mitigate the risk posed by these vulnerabilities. Vulnerabilities are discovered throughout the life of a software system by both the developers, and external testers. Vulnerability discovery ... View full abstract»

• ### Soft Error Mitigation Through Selective Addition of Functionally Redundant Wires

Publication Year: 2008, Page(s):23 - 31
Cited by:  Papers (26)  |  Patents (1)
| | PDF (419 KB) | HTML

We introduce a logic-level soft error mitigation methodology for combinational circuits. The proposed method exploits the existence of logic implications in a design, and is based on selective addition of pertinent functionally redundant wires to the circuit. We demonstrate that the addition of functionally redundant wires reduces the probability that a single-event transient (SET) error will reac... View full abstract»

• ### A New Inverted U-Shape Hazard Function

Publication Year: 2008, Page(s):32 - 40
Cited by:  Papers (2)
| | PDF (622 KB) | HTML

The hazard function describes the unobserved rate at which failures occur. In this paper, we present a new inverted U-shape hazard function, developed for risk-events related to human activities. This hazard shape has received less attention in the literature relative to monotone hazard functions, likely due to the mathematical complexity of their regression models. We present a new survivor funct... View full abstract»

• ### Local Polynomial Fitting in Failure Rate Estimation

Publication Year: 2008, Page(s):41 - 52
Cited by:  Papers (12)
| | PDF (300 KB) | HTML

The failure rate function is one of the most important functions in reliability analysis as it addresses concepts such as scheduling, maintenance, improved system design, cost analysis, etc. Kernel-based estimation of the failure rate function imposes minimal assumptions on the data, and thus offers large flexibility. Therefore, it is very helpful in reliability analysis where the shape of the fai... View full abstract»

• ### Reliability Bounds for Multi-State $k$-out-of- $n$ Systems

Publication Year: 2008, Page(s):53 - 58
Cited by:  Papers (12)
| | PDF (163 KB) | HTML

Algorithms have been available for exact performance evaluation of multi-state k-out-of-n systems. However, especially for complex systems with a large number of components, and a large number of possible states, obtaining "reliability bounds" would be an interesting, significant issue. Reliability bounds will give us a range of the system reliability in a much shorter computation time, which allo... View full abstract»

• ### Two-Way Handshaking Circular Sequential $k$-Out-of- $n$ Congestion System

Publication Year: 2008, Page(s):59 - 70
Cited by:  Papers (5)
| | PDF (415 KB) | HTML

Many communication systems require a two-way, or three-way handshaking process to improve their dependability & authenticity in order to achieve a more successful operation. In this paper, we present a new two-way handshaking reliability model based upon threshold-based cryptography systems. Such systems require a two-way handshaking process to i) establish a group of participated servers in the f... View full abstract»

• ### Estimation of Dependability Measures and Parameter Sensitivities of a Consecutive-$k$-out-of-$n$: F Repairable System With $(k-1)$-Step Markov Dependence by Simulation

Publication Year: 2008, Page(s):71 - 83
Cited by:  Papers (6)
| | PDF (421 KB) | HTML

In this paper, we present two methods, direct simulation (DS), and conditional expectation estimation (CEE), for estimating the unreliability, transient unavailability, steady unavailability, mean time to failure (MTTF), mean time between failure (MTBF), and their parameter sensitivities of consecutive-k-out-of-n: F repairable systems with (k - 1)-step Markov dependence. After an expression of the... View full abstract»

• ### An Efficient Algorithm for Computing the Reliability of Consecutive-$k$-Out-Of-$n$:F Systems

Publication Year: 2008, Page(s):84 - 87
Cited by:  Papers (13)
| | PDF (134 KB) | HTML

Many algorithms for computing the reliability of linear or circular consecutive-k-out-of-n:F systems appeared in this Transactions. The best complexity estimate obtained for solving this problem is O(k3 log(n/k)) operations in the case of i.i.d. components. Using fast algorithms for computing a selected term of a linear recurrence with constant coefficients, we provide an algorithm havi... View full abstract»

• ### A Greedy Branch-and-Bound Inclusion-Exclusion Algorithm for Calculating the Exact Multi-State Network Reliability

Publication Year: 2008, Page(s):88 - 93
Cited by:  Papers (16)
| | PDF (322 KB) | HTML

In this study, a new IE (Inclusion-Exclusion Principle) involving some intuitive properties that characterize the structure of the intersections of d-minimal paths (d-MP)/d-minimal cuts (d-MC), and the relationships between d-MP/d-MC is developed to improve the IE for calculating the exact multi-state network (MSN) reliability. The proposed IE (called the Greedy-B&B-IE) developed first a greed... View full abstract»

• ### The Extension of Universal Generating Function Method to Search for All One-to-Many $d$ -Minimal Paths of Acyclic Multi-State-Arc Flow-Conservation Networks

Publication Year: 2008, Page(s):94 - 102
Cited by:  Papers (8)
| | PDF (391 KB) | HTML

Evaluating network reliability is an important step in the planning, design, and control of systems. The acyclic multi-state-arc flow-conservation network (AMAFCN) is a special multi-state-arc flow-conservation network (MAFCN) of which each arc has independent, discrete, limited multi-states (capacities), and satisfied flow conservation. The AMAFCN is arranged in such a way that no flow leaving a ... View full abstract»

• ### A New Methodology for Risk-Based Availability Analysis

Publication Year: 2008, Page(s):103 - 112
Cited by:  Papers (11)
| | PDF (999 KB) | HTML

This paper presents a risk-based methodology to estimate optimal inspection & maintenance intervals which maximize a system's availability. The methodology is comprised of two steps: availability modeling, and risk-based inspection & maintenance calculations. The methodology is easy to apply, and needs readily available data. The approach can be further improved by including an updating sc... View full abstract»

• ### Modeling and Analyzing a Joint Optimization Policy of Block-Replacement and Spare Inventory With Random-Leadtime

Publication Year: 2008, Page(s):113 - 124
Cited by:  Papers (14)
| | PDF (264 KB) | HTML

We consider a generalized joint optimization policy of block replacement & periodic review spare inventory with random lead time. According to the relationship between geometric area in the graph of inventory level over time, and holding or shortage costs, a model analyzing four mutually exclusive & exhaustive possibilities is developed for the expected average cost per unit time, and is b... View full abstract»

• ### Optimal Age-Replacement Policy Under an Imperfect Renewing Free-Replacement Warranty

Publication Year: 2008, Page(s):125 - 133
Cited by:  Papers (29)
| | PDF (316 KB) | HTML

This paper investigates the effects of an imperfect renewing free-replacement warranty (RFRW) on the classical age-replacement policy for a product with an increasing failure rate. Under the imperfect RFRW, whenever a product fails during the warranty period, it is replaced by a repaired one from an infinite stock of refurbished items, at no cost to the purchaser, with a new full warranty. We assu... View full abstract»

• ### (s,Q) Spare Parts Provisioning Strategy for Periodically Replaced Systems

Publication Year: 2008, Page(s):134 - 139
Cited by:  Papers (9)
| | PDF (180 KB) | HTML

A joint preventive maintenance and spare parts provisioning strategy is suggested for a failure prone system. Replacements are carried-out at failure, if spare parts are available, and at spare parts replenishment delivery instants. Spare parts are provisioned according to an (s, Q) control policy. The ordering parameters, and preventive maintenance interval are derived from a mathematical model w... View full abstract»

• ### Optimal Structure of Multi-State Systems With Uncovered Failures

Publication Year: 2008, Page(s):140 - 148
Cited by:  Papers (22)
| | PDF (253 KB) | HTML

The paper presents a model of multi-state systems in which some groups of elements can be affected by uncovered failures that cause outages of the entire group. It shows that the maximal reliability of such systems can be achieved through a proper balance between two types of task parallelization: parallel task execution with work sharing, and redundant task execution. The paper also suggests a pr... View full abstract»

• ### A New Fault-Information Model for Adaptive & Minimal Routing in 3-D Meshes

Publication Year: 2008, Page(s):149 - 162
Cited by:  Papers (15)
| | PDF (1267 KB) | HTML

In this paper, we rewrite the minimal-connected-component (MCC) model in 2-D meshes in a fully-distributed manner without using global information so that not only can the existence of a Manhattan-distance-path be ensured at the source, but also such a path can be formed by routing-decisions made at intermediate nodes along the path. We propose the MCC model in 3-D meshes, and extend the correspon... View full abstract»

• ### Identifying Optimal Components in a Reliability System

Publication Year: 2008, Page(s):163 - 170
Cited by:  Papers (10)
| | PDF (221 KB) | HTML

The first step in a reliability optimization process is to make a reliability assessment for each component in the system. If this assessment is made in a qualitative way, by grouping together components with the same reliability, and establishing a prevalence order among groups, is there a way to decide which components have the greatest Birnbaum measure without computing the exact value of this ... View full abstract»

• ### The “Bayesian Anomaly” and Its Practical Mitigation

Publication Year: 2008, Page(s):171 - 173
Cited by:  Papers (3)
| | PDF (95 KB) | HTML

A fundamental logical problem in the Bayesian inference of a series system's failure probability is described, a practical means for its mitigation is discussed, and its application to space launch vehicles is illustrated. The problem is the ldquoBayesian Anomaly,rdquo the difference in the system's failure probability per operation inferred from prior estimates, and test or operational experience... View full abstract»

• ### A Reliability Growth Projection Model for One-Shot Systems

Publication Year: 2008, Page(s):174 - 181
Cited by:  Papers (5)
| | PDF (240 KB) | HTML

This paper offers several contributions to the area of discrete reliability growth projection. We present a new, logically derived model for estimating the reliability growth of complex, one-shot systems (i.e., the reliability following implementation of corrective actions to known failure modes). Multiple statistical estimation procedures are utilized to approximate this exact expression. A new e... View full abstract»

• ### MOMS-GA: A Multi-Objective Multi-State Genetic Algorithm for System Reliability Optimization Design Problems

Publication Year: 2008, Page(s):182 - 191
Cited by:  Papers (72)
| | PDF (953 KB) | HTML

A custom genetic algorithm was developed and implemented to solve multiple objective multi-state reliability optimization design problems. Many real-world engineering design problems are multi-objective in nature, and among those, several of them have various levels of system performance ranging from perfectly functioning to completely failed. This multi-objective genetic algorithm uses the univer... View full abstract»

• ### Software Reliability Analysis and Measurement Using Finite and Infinite Server Queueing Models

Publication Year: 2008, Page(s):192 - 203
Cited by:  Papers (33)
| | PDF (442 KB) | HTML

Software reliability is often defined as the probability of failure-free software operation for a specified period of time in a specified environment. During the past 30 years, many software reliability growth models (SRGM) have been proposed for estimating the reliability growth of software. In practice, effective debugging is not easy because the fault may not be immediately obvious. Software en... View full abstract»

• ### An Error Rate Based Test Methodology to Support Error-Tolerance

Publication Year: 2008, Page(s):204 - 214
Cited by:  Papers (7)
| | PDF (467 KB) | HTML

Error-tolerance is an innovative technique to address the problem of low yields in nanometer very large scale integrated (VLSI) circuitry, which is the backbone of the system-on-a-chip (SOC) revolution. The basic principle of error-tolerance is that some chips may occasionally produce erroneous outputs, but still provide acceptable performance when used in certain systems. Using these chips in suc... View full abstract»

## Aims & Scope

IEEE Transactions on Reliability is concerned with the problems involved in attaining reliability, maintaining it through the life of the system or device, and measuring it.

Full Aims & Scope

## Meet Our Editors

Editor-in-Chief
W. Eric Wong
University of Texas at Dallas
Advanced Res Ctr for Software Testing and Quality Assurance

ewong@utdallas.edu