“…• probabilistic critical path identification [61] • incremental SLA agreement violation handling approach [65] reliability [14,20,23,27,42,57,71,75,82,87,88,93,101,110,111,116,117,119,125] • the black-box component is difficult to evaluate their quality • unnecessary restart to recover from failure [20] • reliability-critical workflow components [110,125] • recoverable node failures [87] • a framework and prototype tool for detecting anomalous services [116] • optimal reliable service composition and redundancy technique [23,75] • neighbourhood-based MF [119] • soft-state inference for rapid failure recovery [20] • heuristic recommendation algorithms [125] • FFDA tool and fault injection [110] • k-reliability to calculate the surviving nodes in the subnetwork [101] • reliability prediction using the running time data of the system [93] • task scheduling optimisation model [87] scalability [67,76,81] • only one error at the time [67].…”