{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:42:04Z","timestamp":1742913724131,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319222639"},{"type":"electronic","value":"9783319222646"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22264-6_14","type":"book-chapter","created":{"date-parts":[[2015,8,21]],"date-time":"2015-08-21T10:33:29Z","timestamp":1440153209000},"page":"211-227","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Characterizing Data Dependence Constraints for Dynamic Reliability Using N-Queens Attack Domains"],"prefix":"10.1007","author":[{"given":"Ulya","family":"Bayram","sequence":"first","affiliation":[]},{"given":"Kristin Yvonne","family":"Rozier","sequence":"additional","affiliation":[]},{"given":"Eric W. D.","family":"Rozier","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,22]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Akinyele, J.A., Green, M., Hohenberger, S.: Using smt solvers to automate design tasks for encryption and signature schemes. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 399\u2013410. ACM (2013)","DOI":"10.1145\/2508859.2516718"},{"key":"14_CR2","unstructured":"Anvin, H.P.: The mathematics of raid-6 (2007)"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Bayram, U., Rozier, E.W., Zhou, P., Divine, D.: Improving reliability with dynamic syndrome allocation in intelligent software defined data centers. In: IEEE\/IFIP International Conference on Dependable Systems & Networks, DSN 2015. IEEE (2015)","DOI":"10.1109\/DSN.2015.46"},{"issue":"1","key":"14_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.disc.2007.12.043","volume":"309","author":"J Bell","year":"2009","unstructured":"Bell, J., Stevens, B.: A survey of known results and research areas for n-queens. Discrete Math. 309(1), 1\u201331 (2009)","journal-title":"Discrete Math."},{"key":"14_CR5","unstructured":"Corbett, P., English, B., Goel, A., Grcanac, T., Kleiman, S., Leong, J., Sankar, S.: Row-diagonal parity for double disk failure correction. In: Proceedings of the 3rd USENIX Conference on File and Storage Technologies, pp. 1\u201314 (2004)"},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-540-78800-3_24","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"L de Moura","year":"2008","unstructured":"de Moura, L., Bj\u00f8rner, N.S.: Z3: an efficient SMT solver. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol. 4963, pp. 337\u2013340. Springer, Heidelberg (2008)"},{"key":"14_CR7","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.laa.2004.01.006","volume":"386","author":"S Derisavi","year":"2004","unstructured":"Derisavi, S., Kemper, P., Sanders, W.H.: Symbolic state-space exploration and numerical analysis of state-sharing composed models. Linear Algebra Appl. 386, 137\u2013166 (2004)","journal-title":"Linear Algebra Appl."},{"key":"14_CR8","unstructured":"Duffy, D., Schnase, J.: Meeting the big data challenges of climate science through cloud-enabled climate analytics-as-a-service. In: Proceedings of the 30th International Conference on Massive Storage Systems and Technology. IEEE Computer Society (2014)"},{"key":"14_CR9","first-page":"382","volume":"50","author":"B Eickenscheidt","year":"1980","unstructured":"Eickenscheidt, B.: Das $$n$$-damen-problem auf dem zylinderbrett. Feenschach 50, 382\u2013385 (1980)","journal-title":"Feenschach"},{"issue":"5","key":"14_CR10","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1109\/69.317698","volume":"6","author":"J Gu","year":"1994","unstructured":"Gu, J., et al.: Efficient local search with conflict minimization: a case study of the n-queens problem. IEEE Trans. Knowl. Data Eng. 6(5), 661\u2013668 (1994)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"14_CR11","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.is.2014.07.006","volume":"47","author":"IAT Hashem","year":"2015","unstructured":"Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A.B., Khan, S.U.: The rise of big data on cloud computing: review and open research issues. Inf. Syst. 47, 98\u2013115 (2015)","journal-title":"Inf. Syst."},{"issue":"3","key":"14_CR12","first-page":"177","volume":"12","author":"DA Klarner","year":"1979","unstructured":"Klarner, D.A.: Queen squares. J. Recreational Math 12(3), 177\u2013178 (1979)","journal-title":"J. Recreational Math"},{"key":"14_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-642-21437-0_14","volume-title":"FM 2011: Formal Methods","author":"V Klebanov","year":"2011","unstructured":"Klebanov, V., et al.: The 1st verified software competition: experience report. In: Butler, M., Schulte, W. (eds.) FM 2011. LNCS, vol. 6664, pp. 154\u2013168. Springer, Heidelberg (2011)"},{"key":"14_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1007\/978-3-642-22438-6_30","volume-title":"Automated Deduction \u2013 CADE-23","author":"AS K\u00f6ksal","year":"2011","unstructured":"K\u00f6ksal, A.S., Kuncak, V., Suter, P.: Scala to the power of Z3: Integrating SMT and programming. In: Bj\u00f8rner, N., Sofronie-Stokkermans, V. (eds.) CADE 2011. LNCS, vol. 6803, pp. 400\u2013406. Springer, Heidelberg (2011)"},{"issue":"11","key":"14_CR15","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1145\/1661785.1670144","volume":"7","author":"A Leventhal","year":"2009","unstructured":"Leventhal, A.: Triple-parity raid and beyond. Queue 7(11), 30 (2009)","journal-title":"Queue"},{"key":"14_CR16","doi-asserted-by":"publisher","first-page":"578","DOI":"10.2307\/2320871","volume":"85","author":"CP McCarty","year":"1978","unstructured":"McCarty, C.P.: Queen squares. Am. Math. Monthly 85, 578\u2013580 (1978)","journal-title":"Am. Math. Monthly"},{"issue":"3","key":"14_CR17","first-page":"16","volume":"5","author":"BA Nadel","year":"1990","unstructured":"Nadel, B.A.: Representation selection for constraint satisfaction: a case study using n-queens. IEEE Intell. Syst. 5(3), 16\u201323 (1990)","journal-title":"IEEE Intell. Syst."},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"P\u00e2ris, J.F., Amer, A., Schwarz, T.J.: Low-redundancy two-dimensional raid arrays. In: 2012 International Conference on Computing, Networking and Communications (ICNC), pp. 507\u2013511. IEEE (2012)","DOI":"10.1109\/ICCNC.2012.6167474"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"P\u00e2ris, J.F., Long, D.D., Litwin, W.: Three-dimensional redundancy codes for archival storage. In: 2013 IEEE 21st International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS), pp. 328\u2013332. IEEE (2013)","DOI":"10.1109\/MASCOTS.2013.45"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Patterson, D.A., Gibson, G., Katz, R.H.: A case for redundant arrays of inexpensive disks (RAID), vol. 17. ACM (1988)","DOI":"10.1145\/971701.50214"},{"key":"14_CR21","volume-title":"Introduction to the Theory of Error-Correcting Codes","author":"V Pless","year":"2011","unstructured":"Pless, V.: Introduction to the Theory of Error-Correcting Codes, vol. 48. Wiley, New York (2011)"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Rozier, E.W., Sanders, W.H., Zhou, P., Mandagere, N., Uttamchandani, S.M., Yakushev, M.L.: Modeling the fault tolerance consequences of deduplication. In: 2011 30th IEEE Symposium on Reliable Distributed Systems (SRDS), pp. 75\u201384. IEEE (2011)","DOI":"10.1109\/SRDS.2011.18"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Rozier, E.W., Zhou, P., Divine, D.: Building intelligence for software defined data centers: modeling usage patterns. In: Proceedings of the 6th International Systems and Storage Conference, p. 20. ACM (2013)","DOI":"10.1145\/2485732.2485752"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Rozier, E.W.D., Sanders, W.H.: A framework for efficient evaluation of the fault tolerance of deduplicated storage systems. In: 2012 42nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 1\u201312. IEEE (2012)","DOI":"10.1109\/DSN.2012.6263921"},{"key":"14_CR25","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-0-85729-412-8_16","volume-title":"AResearch and Development in Intelligent Systems XX","author":"MA Salido","year":"2004","unstructured":"Salido, M.A., Barber, F.: How to classify hard and soft constraints in non-binary constraint satisfaction problems. In: Coenen, F., Preece, A., Macintosh, A. (eds.) AResearch and Development in Intelligent Systems XX, pp. 213\u2013226. Springer, New York (2004)"},{"key":"14_CR26","unstructured":"Schnase, J.L., Duffy, D.Q., Tamkin, G.S., Nadeau, D., Thompson, J.H., Grieg, C.M., McInerney, M.A., Webster, W.P.: Merra analytic services: Meeting the big data challenges of climate science through cloud-enabled climate analytics-as-a-service. Computers, Environment and Urban Systems (2014)"},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Schwarz, S., Long, D.D., Paris, J.F.: Reliability of disk arrays with double parity. In: 2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing (PRDC), pp. 108\u2013117. IEEE (2013)","DOI":"10.1109\/PRDC.2013.20"},{"key":"14_CR28","unstructured":"Turner, V., Gantz, J.F., Reinsel, D., Minton, S.: The digital universe of opportunities: Rich data and the increasing value of the internet of things. International Data Corporation, White Paper, IDC$$\\_$$1672 (2014)"},{"key":"14_CR29","unstructured":"Weisstein, E.W.: Rooks problem (2002)"}],"container-title":["Lecture Notes in Computer Science","Quantitative Evaluation of Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22264-6_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T16:20:32Z","timestamp":1675873232000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22264-6_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319222639","9783319222646"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22264-6_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"22 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}