{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T03:48:06Z","timestamp":1760586486260,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540749738"},{"type":"electronic","value":"9783540749745"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01247-1_36","type":"book-chapter","created":{"date-parts":[[2009,4,20]],"date-time":"2009-04-20T08:44:08Z","timestamp":1240217048000},"page":"351-362","source":"Crossref","is-referenced-by-count":7,"title":["Assessing System Availability Using an Enterprise Architecture Analysis Approach"],"prefix":"10.1007","author":[{"given":"Jakob","family":"Raderius","sequence":"first","affiliation":[]},{"given":"Per","family":"N\u00e4rman","sequence":"additional","affiliation":[]},{"given":"Mathias","family":"Ekstedt","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","doi-asserted-by":"crossref","unstructured":"Minoli, D.: Enterprise Architecture A to Z. s.l.: Auerbach (2008)","DOI":"10.1201\/9781420013702"},{"key":"36_CR2","unstructured":"Zachman, J.A.: Concepts of the Framework for Enterprise Architecture (1992)"},{"key":"36_CR3","unstructured":"The Open Group Architecture Framework. TOGAF 8 Enterprise Edition. The Open Group, http:\/\/www.opengroup.org\/togaf\/"},{"key":"36_CR4","series-title":"Information System Frontiers","volume-title":"Enterprise Architecture Analysis with Extended Influence Diagrams","author":"P. Johnson","year":"2007","unstructured":"Johnson, P., et al.: Enterprise Architecture Analysis with Extended Influence Diagrams. Information System Frontiers, vol.\u00a09. Springer, Netherlands (2007)"},{"key":"36_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3502-4","volume-title":"Bayesian Networks and Decision Graphs","author":"F. Jensen","year":"2001","unstructured":"Jensen, F.: Bayesian Networks and Decision Graphs. Springer, New York (2001)"},{"key":"36_CR6","unstructured":"ISO\/IEC. 9126-1 Software Engineering - Product Quality - Quality Model (2001)"},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"N\u00e4rman, P., Johnson, P., Nordstr\u00f6m, L.: Enterprise Architecture: A Framework Supporting System Quality Analysis. In: Proceedings of the 11th International EDOC Conference (2007)","DOI":"10.1109\/EDOC.2007.39"},{"key":"36_CR8","volume-title":"High Availability: Design,Techniques and Processes","author":"M. Hawkins","year":"2001","unstructured":"Hawkins, M., Piedad, F.: High Availability: Design,Techniques and Processes. Prentice Hall, Upper Saddle River (2001)"},{"key":"36_CR9","volume-title":"Usability Engineering","author":"J. Nielsen","year":"1993","unstructured":"Nielsen, J.: Usability Engineering. Academic Press, San Diego (1993)"},{"key":"36_CR10","volume-title":"Performance Solutions: A Practical Guide to Creating Responsive, Scalable Software","author":"C.U. Smith","year":"2001","unstructured":"Smith, C.U., Williams, L.G.: Performance Solutions: A Practical Guide to Creating Responsive, Scalable Software. Pearson Education, Indianapolis (2001)"},{"key":"36_CR11","unstructured":"IEEE. IEEE Standard Glossary of Software Engineering Terminology (1990)"},{"key":"36_CR12","volume-title":"Data Quality for the Information Age","author":"T. Redman","year":"1996","unstructured":"Redman, T.: Data Quality for the Information Age. Artech House, Norwood (1996)"},{"key":"36_CR13","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-33","volume-title":"Underlying Technical Models for Information Technology Security","author":"G. Stoneburner","year":"2001","unstructured":"Stoneburner, G.: Underlying Technical Models for Information Technology Security. National Institute of Standards and Technology, Gaithersburg (2001)"},{"key":"36_CR14","unstructured":"ISO\/IEC. 9126-2 Technical Report - Software Engineering \u2013 Product Quality - Part 2: External Metrics (2003)"},{"key":"36_CR15","volume-title":"Requirements Engineering","author":"I. Sommeville","year":"2004","unstructured":"Sommeville, I., Sawyer, P.: Requirements Engineering. Wiley, Chichester (2004)"},{"key":"36_CR16","unstructured":"Johnson, P., Ekstedt, M.: Enterprise Architecture - Models and Analyses for Information Systems Decision Making. s.l.: Studentlitteratur (2007) ISBN 9789144027524"},{"key":"36_CR17","volume-title":"Effective Service Management - To ITIL and Beyond. s.l.","author":"R. Addy","year":"2007","unstructured":"Addy, R.: Effective Service Management - To ITIL and Beyond. s.l. Springer, Heidelberg (2007)"},{"key":"36_CR18","series-title":"Operations Research","volume-title":"Evaluating influence diagrams","author":"R. Shachter","year":"1986","unstructured":"Shachter, R.: Evaluating influence diagrams. Operations Research, vol.\u00a034(6). Institute for Operations Research and the Management Sciences, Hanover Maryland (1986)"},{"key":"36_CR19","series-title":"Influence Diagrams","volume-title":"Decision Analysis","author":"R.A. Howard","year":"2005","unstructured":"Howard, R.A., Matheson, J.E.: Decision Analysis. Influence Diagrams, vol.\u00a02(3). Institute for Operations Research and the Management Sciences, Hanover Maryland (2005)"},{"key":"36_CR20","volume-title":"Learning Bayesian Networks","author":"R. Neapolitan","year":"2003","unstructured":"Neapolitan, R.: Learning Bayesian Networks. Prentice-Hall, Inc., Upper Saddle River (2003)"},{"key":"36_CR21","unstructured":"GeNIe & SMILE. GeNIe Website (2008), http:\/\/genie.sis.pitt.edu"},{"key":"36_CR22","volume-title":"Assessing the quality of service of an enterprise data warehouse","author":"J. Raderius","year":"2008","unstructured":"Raderius, J.: Assessing the quality of service of an enterprise data warehouse. ICS, KTH, Stockholm (2008)"},{"key":"36_CR23","series-title":"Lecture Notes in Computer Science","volume-title":"Achieving and Assuring High Availability","author":"K. Trivedi","year":"2008","unstructured":"Trivedi, K., et al.: Achieving and Assuring High Availability. LNCS. Springer, Heidelberg (2008)"},{"key":"36_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-2367-3","volume-title":"Performance and Reliability Analysis of Computer Systems","author":"R.A. Sahner","year":"1996","unstructured":"Sahner, R.A., Trivedi, K.S., Puliafito, A.: Performance and Reliability Analysis of Computer Systems. Kluwer Academic Press, Dordrecht (1996)"},{"key":"36_CR25","volume-title":"Probability & Statistics with Reliability, Queueing and Computer Science Applications","author":"K.S. Trivedi","year":"2001","unstructured":"Trivedi, K.S.: Probability & Statistics with Reliability, Queueing and Computer Science Applications, 2nd edn. John Wiley, New York (2001)","edition":"2"},{"key":"36_CR26","volume-title":"Connection availability analysis of span-restorable mesh networks","author":"L. Zhou","year":"2006","unstructured":"Zhou, L., Held, M., Sennhauser, U.: Connection availability analysis of span-restorable mesh networks. Springer Science, Heidelberg (2006)"},{"key":"36_CR27","doi-asserted-by":"crossref","unstructured":"Gr\u00f8nb\u00e6k, J., et al.: Client-Centric Performance Analysis of a High-Availability Cluster (2007)","DOI":"10.1007\/978-3-540-72736-1_8"},{"key":"36_CR28","doi-asserted-by":"crossref","unstructured":"Johnson, P., et al.: A Tool for Enterprise Architecture Analysis. In: Proceedings of the 11th International EDOC Conference (2007)","DOI":"10.1109\/EDOC.2007.25"},{"key":"36_CR29","unstructured":"Gammelg\u00e5rd, et al.: Architecture Scenario Analysis \u2013 Estimating the Credibility of the Results. In: Proceedings of the Seventeenth Annual International Symposium of The International Council on Systems Engineering (2007)"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing \u2013 ICSOC 2007"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01247-1_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T11:44:58Z","timestamp":1558266298000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01247-1_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783540749738","9783540749745"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01247-1_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}