{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:35:39Z","timestamp":1742913339713,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540749738"},{"type":"electronic","value":"9783540749745"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89652-4_15","type":"book-chapter","created":{"date-parts":[[2008,11,19]],"date-time":"2008-11-19T21:04:36Z","timestamp":1227128676000},"page":"162-179","source":"Crossref","is-referenced-by-count":13,"title":["Automatic Realization of SOA Deployment Patterns in Distributed Environments"],"prefix":"10.1007","author":[{"given":"William","family":"Arnold","sequence":"first","affiliation":[]},{"given":"Tamar","family":"Eilam","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Kalantar","sequence":"additional","affiliation":[]},{"given":"Alexander V.","family":"Konstantinou","sequence":"additional","affiliation":[]},{"given":"Alexander A.","family":"Totok","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-74974-5_1","volume-title":"Service-Oriented Computing \u2013 ICSOC 2007","author":"W. Arnold","year":"2007","unstructured":"Arnold, W., Eilam, T., Kalantar, M., Konstantinou, A., Totok, A.: Pattern based SOA deployment. In: Kr\u00e4mer, B.J., Lin, K.-J., Narasimhan, P. (eds.) ICSOC 2007. LNCS, vol.\u00a04749, pp. 1\u201312. Springer, Heidelberg (2007)"},{"key":"15_CR2","unstructured":"IBM: Rational Software Architect for WebSphere Software (RSA) V7.5 (September 2008)"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Mehra, P.: Global deployment of data centers. IEEE Internet Computing\u00a06(5) (September 2002)","DOI":"10.1109\/MIC.2002.1036036"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Brown, A.B., Keller, A., Hellerstein, J.: A model of configuration complexity and its applications to a change management system. In: Integrated Management (2005)","DOI":"10.1109\/INM.2005.1440836"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Bossardt, M., M\u00fchlemann, A., Z\u00fcrcher, R., Plattner, B.: Pattern based service deployment for active networks. In: ANTA (2003)","DOI":"10.1007\/3-540-36199-5_6"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/11596141_22","volume-title":"Service-Oriented Computing - ICSOC 2005","author":"H. Ludwig","year":"2005","unstructured":"Ludwig, H., Gimpel, H., Dan, A., Kearney, B.: Template based automated service provisioning supporting the agreement driven service life-cycle. In: Benatallah, B., Casati, F., Traverso, P. (eds.) ICSOC 2005. LNCS, vol.\u00a03826, pp. 283\u2013295. Springer, Heidelberg (2005)"},{"key":"15_CR7","unstructured":"Redlin, C., Carlson-Neumann, K.: WebSphere Process Server and WebSphere Enterprise Service Bus deployment patterns. Technical report, IBM (November 2006)"},{"key":"15_CR8","unstructured":"IBM: WebSphere Process Server (WPS) V6.1 (2007)"},{"key":"15_CR9","volume-title":"Computers and Intractability: A Guide to the Theory of NP-Completeness","author":"M. Garey","year":"1979","unstructured":"Garey, M., Johnson, D.: Computers and Intractability: A Guide to the Theory of NP-Completeness. Freeman and Company, New York (1979)"},{"key":"15_CR10","unstructured":"Messmer, B.T.: Efficient Graph Matching Algorithms. PhD thesis, University of Bern, Switzerland (November 1995)"},{"key":"15_CR11","unstructured":"IBM: Tivoli Provisioning Manager, TPM (2006)"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1007\/11925071_21","volume-title":"Middleware 2006","author":"K. Maghraoui El","year":"2006","unstructured":"El Maghraoui, K., Meghranjani, A., Eilam, T., Kalantar, M., Konstantinou, A.: Model driven provisioning: Bridging the gap between declarative object models and procedural provisioning tools. In: van Steen, M., Henning, M. (eds.) Middleware 2006. LNCS, vol.\u00a04290, pp. 404\u2013423. Springer, Heidelberg (2006)"},{"key":"15_CR13","volume-title":"NOMS","author":"A. Keller","year":"2004","unstructured":"Keller, A., Hellerstein, J., Wolf, J., Wu, K.L., Krishnan, V.: The CHAMPS system: change management with planning and scheduling. In: NOMS. IEEE Press, Los Alamitos (2004)"},{"key":"15_CR14","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/321556.321562","volume":"17","author":"D. Corneil","year":"1970","unstructured":"Corneil, D., Gotlieb, C.: An efficient algorithm for graph isomorphism. Journal of the ACM\u00a017, 51\u201364 (1970)","journal-title":"Journal of the ACM"},{"issue":"1","key":"15_CR15","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/321921.321925","volume":"23","author":"J. Ullman","year":"1976","unstructured":"Ullman, J.: An algorithm for subgraph isomorphism. Journal of the ACM\u00a023(1), 31\u201342 (1976)","journal-title":"Journal of the ACM"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Gati, G.: Further annotated bibliography on the isomorphism disease. Journal of Graph Theory, 96\u2013109 (1979)","DOI":"10.1002\/jgt.3190030202"},{"issue":"12","key":"15_CR17","doi-asserted-by":"publisher","first-page":"869","DOI":"10.1109\/TSMC.1979.4310140","volume":"9","author":"L. Kitchen","year":"1979","unstructured":"Kitchen, L., Rosenfeld, A.: Discrete relaxation for matching relational structures. IEEE Transactions on Systems, Man, and Cybernetics\u00a09(12), 869\u2013874 (1979)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics"},{"key":"15_CR18","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/0004-3702(80)90051-X","volume":"14","author":"R. Haralick","year":"1980","unstructured":"Haralick, R., Elliot, G.: Increasing tree search efficiency for constraint satisfaction problems. Artificial Intelligence\u00a014, 263\u2013313 (1980)","journal-title":"Artificial Intelligence"},{"key":"15_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-11493-9","volume-title":"Group-Theoretic Algorithms and Graph Isomorphism","author":"C. Hoffman","year":"1982","unstructured":"Hoffman, C.: Group-Theoretic Algorithms and Graph Isomorphism. Springer, Heidelberg (1982)"},{"key":"15_CR20","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1109\/34.75511","volume":"13","author":"W. Kim","year":"1991","unstructured":"Kim, W., Kak, A.: 3-D object recognition using bipartite matching embedded in discrete relaxation. IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI)\u00a013, 224\u2013251 (1991)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI)"},{"key":"15_CR21","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1109\/TSMC.1979.4310127","volume":"9","author":"W. Tsai","year":"1979","unstructured":"Tsai, W., Fu, K.: Error-correcting isomorphisms of attributed relational graphs for pattern recognition. IEEE Trans. on Sys., Man, and Cybernetics\u00a09, 757\u2013768 (1979)","journal-title":"IEEE Trans. on Sys., Man, and Cybernetics"},{"key":"15_CR22","first-page":"124","volume-title":"Genetic Algorithms","author":"K. Jong De","year":"1989","unstructured":"De Jong, K., Spears, W.: Using genetic algorithms to solve NP-Complete problems. In: Schaffer, J.D. (ed.) Genetic Algorithms, pp. 124\u2013132. Morgan Kaufmann, San Francisco (1989)"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Abrams, S., Bloom, B., Keyser, P., Kimelman, D., Nelson, E., Neuberger, W., Roth, T., Simmonds, I., Tang, S., Vlissides, J.: Architectural thinking and modeling with the Architects\u2019 Workbench. IBM Systems Journal\u00a045(3) (2006)","DOI":"10.1147\/sj.453.0481"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing \u2013 ICSOC 2007"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89652-4_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T11:42:12Z","timestamp":1557920532000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89652-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540749738","9783540749745"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89652-4_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}