{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:58:25Z","timestamp":1725487105426},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540729853"},{"type":"electronic","value":"9783540729860"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72986-0_9","type":"book-chapter","created":{"date-parts":[[2007,7,6]],"date-time":"2007-07-06T04:54:10Z","timestamp":1183697650000},"page":"97-108","source":"Crossref","is-referenced-by-count":1,"title":["Modeling Change Without Breaking Promises"],"prefix":"10.1007","author":[{"given":"Alva L.","family":"Couch","sequence":"first","affiliation":[]},{"given":"Hengky","family":"Susanto","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Chiarini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/11568285_9","volume-title":"Ambient Networks","author":"M. Burgess","year":"2005","unstructured":"Burgess, M.: An approach to understanding policy based on autonomy and voluntary cooperation. In: Sch\u00f6nw\u00e4lder, J., Serrat, J. (eds.) DSOM 2005. LNCS, vol.\u00a03775, pp. 97\u2013108. Springer, Heidelberg (2005)"},{"key":"9_CR2","unstructured":"Burgess, M., Begnum, K.: Voluntary cooperation in pervasive computing services. In: LISA, USENIX, pp. 143\u2013154 (2005)"},{"key":"9_CR3","unstructured":"Burgess, M., Fagernes, S.: Pervasive computer management: A model of network policy with local autonomy. IEEE Transactions on Networking (submitted)"},{"key":"9_CR4","first-page":"118","volume-title":"ICNS","author":"M. Burgess","year":"2006","unstructured":"Burgess, M., Fagernes, S.: Promise theory - a model of autonomous objects for pervasive computing and swarms. In: ICNS, p. 118. IEEE Computer Society, Los Alamitos (2006)"},{"key":"9_CR5","unstructured":"Burgess, M., Couch, A.: Modeling next generation configuration management tools. In: LISA, USENIX, pp. 131\u2013147 (2006)"},{"key":"9_CR6","unstructured":"Aredo, D., Burgess, M., Hagen, S.: A promise theory view on the policies of object orientation and the service oriented architecture (preprint) (submitted)"},{"key":"9_CR7","unstructured":"Bergstra, J., Burgess, M.: Local and global trust based on the concept of promises. Technical Report PRG0606, University of Amsterdam (2006)"},{"key":"9_CR8","unstructured":"Burgess, M., Couch, A.: Autonomic computing approximated by fixed-point promises. In: Proceedings of First IEEE International Workshop on Modeling Autonomic Communication Environments (MACE), pp. 197\u2013222 (2006)"},{"key":"9_CR9","first-page":"309","volume-title":"Computing systems","author":"M. Burgess","year":"1995","unstructured":"Burgess, M.: A site configuration engine. In: Computing systems, vol.\u00a08, p. 309. MIT Press, Cambridge MA (1995)"},{"issue":"9","key":"9_CR10","doi-asserted-by":"publisher","first-page":"1083","DOI":"10.1002\/(SICI)1097-024X(199709)27:9<1083::AID-SPE126>3.0.CO;2-H","volume":"27","author":"M. Burgess","year":"1997","unstructured":"Burgess, M., Ralston, R.: Distributed resource administration using cfengine. Softw. Pract. Exper.\u00a027(9), 1083\u20131101 (1997)","journal-title":"Softw. Pract. Exper."},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"1519","DOI":"10.1002\/(SICI)1097-024X(19981210)28:14<1519::AID-SPE213>3.0.CO;2-N","volume":"28","author":"M. Burgess","year":"1998","unstructured":"Burgess, M.: Automated system administration with feedback regulation. Software practice and experience\u00a028, 1519 (1998)","journal-title":"Software practice and experience"},{"key":"9_CR12","unstructured":"Burgess, M.: Cfengine as a component of computer immune-systems. In: Proceedings of the Norwegian conference on Informatics (1998)"},{"key":"9_CR13","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.scico.2003.12.004","volume":"51","author":"M. Burgess","year":"2004","unstructured":"Burgess, M.: Configurable immunity for evolving human-computer systems. Science of Computer Programming\u00a051, 197 (2004)","journal-title":"Science of Computer Programming"},{"key":"9_CR14","unstructured":"Alva, L., Couch, D., Gilfix, M.: It\u2019s elementary, dear watson: Applying logic programming to convergent system management processes. In: LISA \u201999: Proceedings of the 13th USENIX conference on System administration, Berkeley, CA, USA, USENIX Association, pp. 123\u2013138 (1999)"},{"key":"9_CR15","unstructured":"Bergstra, J., Bethke, I., Burgess, M.: A process algebra based framework for promise theory. Technical Report PRG0701, University of Amsterdam (2007)"},{"key":"9_CR16","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.scico.2004.04.002","volume":"53","author":"A. Couch","year":"2004","unstructured":"Couch, A., Sun, Y.: On observed reproducibility in network configuration management. Science of Computer Programming\u00a053, 215\u2013253 (2004)","journal-title":"Science of Computer Programming"}],"container-title":["Lecture Notes in Computer Science","Inter-Domain Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72986-0_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:09:18Z","timestamp":1605762558000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72986-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540729853","9783540729860"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72986-0_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}