{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:12:34Z","timestamp":1743081154328,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319222639"},{"type":"electronic","value":"9783319222646"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22264-6_8","type":"book-chapter","created":{"date-parts":[[2015,8,21]],"date-time":"2015-08-21T10:33:29Z","timestamp":1440153209000},"page":"113-121","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Compression App for Continuous Probability Distributions"],"prefix":"10.1007","author":[{"given":"Michael","family":"Bungert","sequence":"first","affiliation":[]},{"given":"Holger","family":"Hermanns","sequence":"additional","affiliation":[]},{"given":"Reza","family":"Pulungan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,22]]},"reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-642-54792-8_16","volume-title":"Principles of Security and Trust","author":"F Arnold","year":"2014","unstructured":"Arnold, F., Hermanns, H., Pulungan, R., Stoelinga, M.: Time-dependent analysis of attacks. In: Abadi, M., Kremer, S. (eds.) POST 2014 (ETAPS 2014). LNCS, vol. 8414, pp. 285\u2013305. Springer, Heidelberg (2014)"},{"issue":"6","key":"8_CR2","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1109\/TSE.2003.1205180","volume":"29","author":"C Baier","year":"2003","unstructured":"Baier, C., Haverkort, B.R., Hermanns, H., Katoen, J.-P.: Model-checking algorithms for continuous-time Markov chains. IEEE Trans. Software Eng. 29(6), 524\u2013541 (2003)","journal-title":"IEEE Trans. Software Eng."},{"issue":"9","key":"8_CR3","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/1810891.1810912","volume":"53","author":"C Baier","year":"2010","unstructured":"Baier, C., Haverkort, B.R., Hermanns, H., Katoen, J.-P.: Performance evaluation and model checking join forces. Commun. ACM 53(9), 76\u201385 (2010). Sept","journal-title":"Commun. ACM"},{"issue":"5","key":"8_CR4","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/s12599-009-0068-x","volume":"1","author":"A Benlian","year":"2009","unstructured":"Benlian, A., Hess, T., Buxmann, P.: Drivers of SaaS-adoption an empirical study of different application types. Business & Information Systems Engineering 1(5), 357\u2013369 (2009)","journal-title":"Business & Information Systems Engineering"},{"issue":"2","key":"8_CR5","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1109\/TDSC.2009.45","volume":"7","author":"H Boudali","year":"2010","unstructured":"Boudali, H., Crouzen, P., Stoelinga, M.: A rigorous, compositional, and extensible framework for dynamic fault tree analysis. IEEE Trans. Depend. Sec. Comput. 7(2), 128\u2013143 (2010)","journal-title":"IEEE Trans. Depend. Sec. Comput."},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"59","DOI":"10.2307\/3215235","volume":"31","author":"P Buchholz","year":"1994","unstructured":"Buchholz, P.: Exact and ordinary lumpability in finite Markov chains. Journal of Applied Probability 31, 59\u201375 (1994)","journal-title":"Journal of Applied Probability"},{"issue":"2","key":"8_CR7","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/2430545.2430550","volume":"22","author":"S Chaki","year":"2013","unstructured":"Chaki, S., Schallhart, C., Veith, H.: Verification across intellectual property boundaries. ACM Trans. Softw. Eng. Methodol. 22(2), 15 (2013)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"doi-asserted-by":"crossref","unstructured":"Courtney, T., Gaonkar, S., Keefe, K., Rozier, E., Sanders, W.H.: M\u00f6bius 2.3: an extensible tool for dependability, security, and performance evaluation of large and complex system models. In: DSN, pp. 353\u2013358. IEEE (2009)","key":"8_CR8","DOI":"10.1109\/DSN.2009.5270318"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-642-19811-3_9","volume-title":"Fundamental Approaches to Software Engineering","author":"P Crouzen","year":"2011","unstructured":"Crouzen, P., Lang, F.: Smart reduction. In: Giannakopoulou, D., Orejas, F. (eds.) FASE 2011. LNCS, vol. 6603, pp. 111\u2013126. Springer, Heidelberg (2011)"},{"issue":"3","key":"8_CR10","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1109\/24.159800","volume":"41","author":"JB Dugan","year":"1992","unstructured":"Dugan, J.B., Bavuso, S.J., Boyd, M.A.: Dynamic fault-tree models for fault-tolerant computer systems. IEEE Trans. Reliab. 41(3), 363\u2013377 (1992)","journal-title":"IEEE Trans. Reliab."},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1007\/3-540-46029-2_5","volume-title":"Computer Performance Evaluation","author":"A Horv\u00e1th","year":"2002","unstructured":"Horv\u00e1th, A., Telek, M.: PhFit: a general phase-type fitting tool. In: Field, T., Harrison, P.G., Bradley, J., Harder, U. (eds.) TOOLS 2002. LNCS, vol. 2324, pp. 82\u201391. Springer, Heidelberg (2002)"},{"unstructured":"Johnson, M.A., Taaffe, M.R.: The denseness of phase distributions. School of Industrial Engineering Research Memoranda, pp. 88\u201320. Purdue University (1988)","key":"8_CR12"},{"doi-asserted-by":"crossref","unstructured":"Kaplan, F.: Are gesture-based interfaces the future of human computer interaction? In: ICMI 2009, pp. 239\u2013240. ACM (2009)","key":"8_CR13","DOI":"10.1145\/1647314.1647365"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-642-16612-9_11","volume-title":"Runtime Verification","author":"A Legay","year":"2010","unstructured":"Legay, A., Delahaye, B., Bensalem, S.: Statistical model checking: an overview. In: Barringer, H., Falcone, Y., Finkbeiner, B., Havelund, K., Lee, I., Pace, G., Ro\u015fu, G., Sokolsky, O., Tillmann, N. (eds.) RV 2010. LNCS, vol. 6418, pp. 122\u2013135. Springer, Heidelberg (2010)"},{"key":"8_CR15","volume-title":"Matrix-Geometric Solutions in Stochastic Models: an Algorithmic Approach","author":"MF Neuts","year":"1981","unstructured":"Neuts, M.F.: Matrix-Geometric Solutions in Stochastic Models: an Algorithmic Approach. Dover, Baltimore (1981)"},{"doi-asserted-by":"crossref","unstructured":"Pulungan, R., Hermanns, H.: Acyclic minimality by construction\u2013almost. In: QEST, pp. 63\u201372. IEEE Computer Society (2009)","key":"8_CR16","DOI":"10.1109\/QEST.2009.45"},{"issue":"1","key":"8_CR17","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s10009-013-0296-8","volume":"17","author":"R Pulungan","year":"2015","unstructured":"Pulungan, R., Hermanns, H.: A construction and minimization service for continuous probability distributions. STTT 17(1), 77\u201390 (2015)","journal-title":"STTT"},{"issue":"3","key":"8_CR18","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1109\/TDSC.2006.27","volume":"3","author":"A Th\u00fcmmler","year":"2006","unstructured":"Th\u00fcmmler, A., Buchholz, P., Telek, M.: A novel approach for phase-type fitting with the EM algorithm. IEEE Trans. Depend. Sec. Comput. 3(3), 245\u2013258 (2006)","journal-title":"IEEE Trans. Depend. Sec. Comput."}],"container-title":["Lecture Notes in Computer Science","Quantitative Evaluation of Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22264-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T14:29:51Z","timestamp":1676471391000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22264-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319222639","9783319222646"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22264-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"22 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}