{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:57:18Z","timestamp":1725533838222},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642026263"},{"type":"electronic","value":"9783642026270"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02627-0_3","type":"book-chapter","created":{"date-parts":[[2009,6,18]],"date-time":"2009-06-18T05:05:54Z","timestamp":1245301554000},"page":"28-41","source":"Crossref","is-referenced-by-count":7,"title":["Dynamics of Resource Closure Operators"],"prefix":"10.1007","author":[{"given":"Alva L.","family":"Couch","sequence":"first","affiliation":[]},{"given":"Marc","family":"Chiarini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.scico.2003.12.004","volume":"51","author":"M. Burgess","year":"2004","unstructured":"Burgess, M.: Configurable immunity for evolving human-computer systems. Science of Computer Programming\u00a051, 197 (2004)","journal-title":"Science of Computer Programming"},{"key":"3_CR2","unstructured":"Burgess, M.: Computer immunology. In: Proceedings of the Twelth Systems Administration Conference (LISA XII), USENIX Association: Berkeley, CA, p. 283 (1998)"},{"key":"3_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.scico.2003.08.001","volume":"49","author":"M. Burgess","year":"2003","unstructured":"Burgess, M.: On the theory of system administration. Science of Computer Programming\u00a049, 1 (2003)","journal-title":"Science of Computer Programming"},{"key":"3_CR4","unstructured":"Burgess, M.: Cfengine as a component of computer immune-systems. In: Proceedings of the Norwegian Conference on Informatics (1998)"},{"issue":"2","key":"3_CR5","first-page":"309","volume":"8","author":"M. Burgess","year":"1995","unstructured":"Burgess, M.: A site configuration engine. Computing Systems\u00a08(2), 309\u2013337 (1995)","journal-title":"Computing Systems"},{"issue":"9","key":"3_CR6","doi-asserted-by":"publisher","first-page":"1083","DOI":"10.1002\/(SICI)1097-024X(199709)27:9<1083::AID-SPE126>3.0.CO;2-H","volume":"27","author":"M. Burgess","year":"1997","unstructured":"Burgess, M., Ralston, R.: Distributed resource administration using cfengine. Softw., Pract. Exper.\u00a027(9), 1083\u20131101 (1997)","journal-title":"Softw., Pract. Exper."},{"key":"3_CR7","unstructured":"Burgess, M., Couch, A.: Autonomic computing approximated by fixed-point promises. In: Proceedings of the First IEEE International Workshop on Modeling Autonomic Communication Environments (MACE), pp. 197\u2013222. Multicon Verlag (2006)"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-540-70587-1_12","volume-title":"Resilient Networks and Services","author":"A.L. Couch","year":"2008","unstructured":"Couch, A.L., Chiarini, M.: Dynamic consistency analysis for convergent operators. In: Hausheer, D., Sch\u00f6nw\u00e4lder, J. (eds.) AIMS 2008. LNCS, vol.\u00a05127, pp. 148\u2013161. Springer, Heidelberg (2008)"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-540-70587-1_13","volume-title":"Resilient Networks and Services","author":"A.L. Couch","year":"2008","unstructured":"Couch, A.L., Chiarini, M.: A theory of closure operators. In: Hausheer, D., Sch\u00f6nw\u00e4lder, J. (eds.) AIMS 2008. LNCS, vol.\u00a05127, pp. 162\u2013174. Springer, Heidelberg (2008)"},{"key":"3_CR10","unstructured":"Couch, A., Hart, J., Idhaw, E.G., Kallas, D.: Seeking closure in an open world: A behavioral agent approach to configuration management. In: LISA 2003: Proceedings of the 17th USENIX Conference on System Administration, Berkeley, CA, USA, pp. 125\u2013148. USENIX (2003)"},{"key":"3_CR11","unstructured":"Schwartzberg, S., Couch, A.: Experience implementing a web service closure. In: LISA 2004: Proceedings of the 18th USENIX Conference on System Administration, Berkeley, CA, USA, pp. 213\u2013230. USENIX (2004)"},{"key":"3_CR12","unstructured":"Wu, N., Couch, A.: Experience implementing an ip address closure. In: LISA 2006: Proceedings of the 20th USENIX Conference on System Administration, Berkeley, CA, USA, pp. 119\u2013130. USENIX (2006)"},{"issue":"5","key":"3_CR13","first-page":"112","volume":"33","author":"A. Couch","year":"2008","unstructured":"Couch, A.: Summary of the third workshop on hot topics in autonomic computing (HotAC III). Login: Magazine\u00a033(5), 112\u2013113 (2008)","journal-title":"Login: Magazine"},{"key":"3_CR14","doi-asserted-by":"publisher","DOI":"10.1002\/047166880X","volume-title":"Feedback Control of Computing Systems","author":"J.L. Hellerstein","year":"2004","unstructured":"Hellerstein, J.L., Diao, Y., Parekh, S., Tilbury, D.M.: Feedback Control of Computing Systems. John Wiley & Sons, Chichester (2004)"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Sauve, J., Moura, A., Sampaio, M., Jornada, J., Radziuk, E.: An introductory overview and survey of Business-Driven IT management. In: The First IEEE\/IFIP International Workshop on Business-Driven IT Management (BDIM), pp. 1\u201310 (2006)","DOI":"10.1109\/BDIM.2006.1649205"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Moura, A., Sauve, J., Bartolini, C.: Research challenges of Business-Driven IT management. In: The Second IEEE\/IFIP International Workshop on Business-Driven IT Management (BDIM), pp. 19\u201328 (2007)","DOI":"10.1109\/BDIM.2007.375008"},{"key":"3_CR17","unstructured":"R Development Core Team: R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria (2008) ISBN 3-900051-07-0"}],"container-title":["Lecture Notes in Computer Science","Scalability of Networks and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02627-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,8]],"date-time":"2019-03-08T16:51:30Z","timestamp":1552063890000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02627-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642026263","9783642026270"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02627-0_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}