{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:33:51Z","timestamp":1725521631370},"publisher-location":"Berlin, Heidelberg","reference-count":45,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540921875"},{"type":"electronic","value":"9783540921882"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-92188-2_7","type":"book-chapter","created":{"date-parts":[[2008,12,3]],"date-time":"2008-12-03T04:00:21Z","timestamp":1228276821000},"page":"153-178","source":"Crossref","is-referenced-by-count":6,"title":["Self Management for Large-Scale Distributed Systems: An Overview of the SELFMAN Project"],"prefix":"10.1007","author":[{"given":"Peter","family":"Van Roy","sequence":"first","affiliation":[]},{"given":"Seif","family":"Haridi","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Reinefeld","sequence":"additional","affiliation":[]},{"given":"Jean-Bernard","family":"Stefani","sequence":"additional","affiliation":[]},{"given":"Roland","family":"Yap","sequence":"additional","affiliation":[]},{"given":"Thierry","family":"Coupaye","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Arad, C., Roverso, R., Haridi, S., Jaradin, Y., Mejias, B., Van Roy, P., Coupaye, T., Dillenseger, B., Diaconescu, A., Harbaoui, A., Jayaprakash, N., Kessis, M., Lefebvre, A., Leger, M.: Report on architectural framework specification. SELFMAN Deliverable D2.2a (June 2007), www.ist-selfman.org"},{"key":"7_CR2","unstructured":"Armstrong, J.: Making Reliable Distributed Systems in the Presence of Software Errors. Ph.D. dissertation, Royal Institute of Technology (KTH), Stockholm, Sweden (November 2003)"},{"issue":"2","key":"7_CR3","first-page":"406","volume":"84","author":"W.B. Arthur","year":"1994","unstructured":"Arthur, W.B.: Complexity in economic theory: Inductive reasoning and bounded rationality. The American Economic Review\u00a084(2), 406\u2013411 (1994)","journal-title":"The American Economic Review"},{"key":"7_CR4","volume-title":"An Introduction to Cybernetics","author":"W.A. Ross","year":"1956","unstructured":"Ross, W.A.: An Introduction to Cybernetics. Chapman & Hall Ltd., London, (1956), pcp.vub.ac.be\/books\/IntroCyb.pdf"},{"key":"7_CR5","unstructured":"von Bertalanffy, L.: General System Theory: Foundations, Development, Applications, George Braziller (1969)"},{"key":"7_CR6","unstructured":"Capra, F.: It\u2019s a Wonderful Life. Liberty Films (1946)"},{"key":"7_CR7","unstructured":"Carroll, L.: Through the Looking-Glass and What Alice Found There (1872) (Dover Publications reprint 1999)"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Carton, B., Mesaros, V.: Improving the Scalability of Logarithmic-Degree DHT-Based Peer-to-Peer Networks. In: 10th International Euro-Par Conference, pp. 1060\u20131067 (August 2004)","DOI":"10.1007\/978-3-540-27866-5_143"},{"key":"7_CR9","unstructured":"Collet, R., Lienhardt, M., Schmitt, A., Stefani, J.-B., Van Roy, P.: Report on formal operational semantics (components and reflection). SELFMAN Deliverable D2.3a (November 2007), www.ist-selfman.org"},{"key":"7_CR10","unstructured":"Encyclopaedia Britannica. Article Human Endocrine System (2005)"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Fairley, P.: The Unruly Power Grid, IEEE Spectrum (October 2005)","DOI":"10.1109\/MSPEC.2004.1318179"},{"key":"7_CR12","unstructured":"France T\u00e9l\u00e9com, Zuse Institut Berlin, and Peerialism AB. User requirements, SELFMAN Deliverable D5.1 (November 2007), http:\/\/www.ist-selfman.org"},{"key":"7_CR13","unstructured":"Ghodsi, A.: Distributed K-ary System: Algorithms for Distributed Hash Tables, Ph.D. dissertation, Royal Institute of Technology (KTH), Stockholm, Sweden (October 2006)"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-540-71661-7_7","volume-title":"Databases, Information Systems, and Peer-to-Peer Computing","author":"A. Ghodsi","year":"2007","unstructured":"Ghodsi, A., Alima, L.O., Haridi, S.: Symmetric replication for structured peer-to-peer systems. In: Moro, G., Bergamaschi, S., Joseph, S., Morin, J.-H., Ouksel, A.M. (eds.) DBISP2P 2005. LNCS, vol.\u00a04125, pp. 74\u201385. Springer, Heidelberg (2007)"},{"key":"7_CR15","first-page":"133","volume-title":"ACM Trans. Database Syst.","author":"J. Gray","year":"2006","unstructured":"Gray, J., Lamport., L.: Consensus on transaction commit. In: ACM Trans. Database Syst., pp. 133\u2013160. ACM Press, New York (2006)"},{"key":"7_CR16","volume-title":"Introduction to Reliable Distributed Programming","author":"R. Guerraoui","year":"2006","unstructured":"Guerraoui, R., Rodrigues, L.: Introduction to Reliable Distributed Programming. Springer, Berlin (2006)"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Halim, F., Wu, Y., Yap, R.: Security Issues in Small World Network Routing. In: Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2008) (October 2008)","DOI":"10.1109\/SASO.2008.21"},{"issue":"3859","key":"7_CR18","doi-asserted-by":"publisher","first-page":"1243","DOI":"10.1126\/science.162.3859.1243","volume":"162","author":"G. Hardin","year":"1968","unstructured":"Hardin, G.: The Tragedy of the Commons. Science\u00a0162(3859), 1243\u20131248 (1968)","journal-title":"Science"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Hellerstein, J.L., Diao, Y., Parekh, S., Tilbury, D.M.: Feedback Control of Computing Systems. Wiley-IEEE Press (2004)","DOI":"10.1002\/047166880X"},{"key":"7_CR20","unstructured":"Hoglund, G., McGraw, G.: Exploiting Online Games: Cheating Massively Distributed Systems. Addison-Wesley Software Security Series (2008)"},{"key":"7_CR21","unstructured":"IBM. Autonomic computing: IBM\u2019s perspective on the state of information technology (2001) researchweb.watson.ibm.com\/autonomic"},{"key":"7_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-540-30229-2_5","volume-title":"Middleware 2004","author":"M. Jelasity","year":"2004","unstructured":"Jelasity, M., Guerraoui, R., Kermarrec, A.-M., van Steen, M.: The Peer Sampling Service: Experimental Evaluation of Unstructured Gossip-Based Implementations. In: Jacobsen, H.-A. (ed.) Middleware 2004. LNCS, vol.\u00a03231, pp. 79\u201398. Springer, Heidelberg (2004)"},{"key":"7_CR23","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1529\/biophysj.107.105106","volume":"94","author":"J.-R. Kim","year":"2008","unstructured":"Kim, J-R, Yoon, Y., Cho, K.-H.: Coupled Feedback Loops Form Dynamic Motifs of Cellular Networks. Biophysical Journal\u00a094, 359\u2013365 (2008)","journal-title":"Biophysical Journal"},{"key":"7_CR24","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1006\/jtbi.2003.3190","volume":"221","author":"T. Kobayashi","year":"2003","unstructured":"Kobayashi, T., Chen, L., Aihara, K.: Modeling Genetic Switches with Positive Feedback Loops. J. theor. Biol.\u00a0221, 379\u2013399 (2003)","journal-title":"J. theor. Biol."},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Lienhard, M., Schmitt, A., Stefani, J.-B.: Oz\/K: A Kernel Language for Component-Based Open Programming. In: Sixth International Conference on Generative Programming and Component Engineering (GPCE 2007) (October 2007)","DOI":"10.1145\/1289971.1289980"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Mejias, B., Van Roy, P.: A Relaxed Ring for Self-Organising and Fault-Tolerant Peer-to-Peer Networks. In: XXVI International Conference of the Chilean Computer Science Society (SCCC 2007) (November 2007)","DOI":"10.1109\/SCCC.2007.15"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Moser, M., Haridi, S.: Atomic Commitment in Transactional DHTs. In: Proc. of the CoreGRID Symposium. Rennes, France (August 2007)","DOI":"10.1007\/978-0-387-72498-0_14"},{"key":"7_CR28","unstructured":"Moser, M., Haridi, S., Sch\u00fctt, T., Plantikow, S., Reinefeld, A., Schintke, F.: First report on formal models for transactions over structured overlay networks. SELFMAN Deliverable D3.1a (June 2007), www.ist-selfman.org"},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"Pigolotti, S., Krishna, S., Jensen, M.H.: Oscillation patterns in negative feedback loops. Proc. National Academy of Sciences\u00a0104(16) (April 2007)","DOI":"10.1073\/pnas.0610759104"},{"key":"7_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/978-3-540-75694-1_25","volume-title":"Managing Virtualization of Networks and Services","author":"S. Plantikow","year":"2007","unstructured":"Plantikow, S., Reinefeld, A., Schintke, F.: Transactions for distributed wikis on structured overlays. In: Clemm, A., Granville, L.Z., Stadler, R. (eds.) DSOM 2007. LNCS, vol.\u00a04785, pp. 256\u2013267. Springer, Heidelberg (2007)"},{"key":"7_CR31","volume-title":"Rules of Play: Game Design Fundamentals","author":"K. Salen","year":"2003","unstructured":"Salen, K., Zimmerman, E.: Rules of Play: Game Design Fundamentals. MIT Press, Cambridge (2003)"},{"key":"7_CR32","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.comcom.2007.08.027","volume":"31","author":"T. Sch\u00fctt","year":"2008","unstructured":"Sch\u00fctt, T., Schintke, F., Reinefeld, A.: Range Queries on Structured Overlay Networks. Computer Communications\u00a031, 280\u2013291 (2008)","journal-title":"Computer Communications"},{"key":"7_CR33","unstructured":"SELFMAN: Self Management for Large-Scale Distributed Systems based on Structured Overlay Networks and Components, European Commission 6th Framework Programme (June 2006), http:\/\/www.ist-selfman.org"},{"key":"7_CR34","doi-asserted-by":"crossref","unstructured":"Shafaat, T.M., Ghodsi, A., Haridi, S.: Dealing with Network Partitions in Structured Overlay Networks. Journal of Peer-to-Peer Networking and Applications (to appear, 2008)","DOI":"10.1109\/P2P.2007.42"},{"key":"7_CR35","series-title":"Lecture Notes in Computer Science","volume-title":"CoreGRID Integration Workshop","author":"T. Shafaat","year":"2008","unstructured":"Shafaat, T.M., Moser, M., Ghodsi, A., Sch\u00fctt, T., Haridi, S., Reinefeld, A.: On Consistency of Data in Structured Overlay Networks. In: CoreGRID Integration Workshop. Heraklion, Greece. LNCS. Springer, Heidelberg (2008)"},{"key":"7_CR36","doi-asserted-by":"crossref","unstructured":"Stoica, I., Morris, R., Karger, D.R., Frans Kaashoek, M., Balakrishnan, H.: Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications. In: SIGCOMM 2001. pp. 149\u2013160 (2001)","DOI":"10.1145\/383059.383071"},{"key":"7_CR37","doi-asserted-by":"crossref","unstructured":"Van Roy, P.: Self Management and the Future of Software Design. In: Third International Workshop on Formal Aspects of Component Software (FACS 2006), ENTCS. vol.\u00a0182, pp. 201\u2013217 (June 2007)","DOI":"10.1016\/j.entcs.2006.12.043"},{"key":"7_CR38","unstructured":"Weinberg, G. M.: An Introduction to General Systems Thinking: Silver Anniversary Edition. Dorset House (2001) (original edition 1975)"},{"key":"7_CR39","unstructured":"Whitehead, A.N.: Quote: Civilization advances by extending the number of important operations which we can perform without thinking of them"},{"key":"7_CR40","volume-title":"Cybernetics, or Control and Communication in the Animal and the Machine","author":"N. Wiener","year":"1948","unstructured":"Wiener, N.: Cybernetics, or Control and Communication in the Animal and the Machine. MIT Press, Cambridge (1948)"},{"key":"7_CR41","unstructured":"Wiger, U.: Four-Fold Increase in Productivity and Quality \u2013 Industrial-Strength Functional Programming in Telecom-Class Products. In: Proceedings of the 2001 Workshop on Formal Design of Safety Critical Embedded Systems (2001)"},{"key":"7_CR42","unstructured":"Wikipedia, the free encyclopedia. Article Belief Propagation (March 2008), http:\/\/en.wikipedia.org\/wiki\/Belief_propagation"},{"key":"7_CR43","doi-asserted-by":"crossref","unstructured":"Wolpert, D.H., Wheeler, K.R., Tumer, K.: General principles of learning-based multi-agent systems. In: Proc. Third Annual Conference on Autonomous Agents (AGENTS 1999). pp. 77\u201393 (May 1999)","DOI":"10.1145\/301136.301167"},{"key":"7_CR44","doi-asserted-by":"crossref","unstructured":"Wolpert, D. H., Kevin, R., Wheeler, Tumer, K.: Collective intelligence for control of distributed dynamical systems. Europhys. Lett. (2000)","DOI":"10.1209\/epl\/i2000-00208-x"},{"key":"7_CR45","unstructured":"Yap, R., Halim, F., Wu, Y.: First report on security in structured overlay networks. SELFMAN Deliverable D1.3a (November 2007), www.ist-selfman.org"}],"container-title":["Lecture Notes in Computer Science","Formal Methods for Components and Objects"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-92188-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T19:12:37Z","timestamp":1557947557000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-92188-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540921875","9783540921882"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-92188-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}