{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T14:21:43Z","timestamp":1648650103065},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2013,5,3]],"date-time":"2013-05-03T00:00:00Z","timestamp":1367539200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1007\/s11704-013-2210-7","type":"journal-article","created":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T22:53:13Z","timestamp":1367535193000},"page":"583-594","source":"Crossref","is-referenced-by-count":1,"title":["A matrix grammar approach for automatic distributed network resource management"],"prefix":"10.1007","volume":"7","author":[{"given":"Weidong","family":"Min","sequence":"first","affiliation":[]},{"given":"Ke","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yongzhen","family":"Ke","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,3]]},"reference":[{"key":"2210_CR1","volume-title":"Essential SNMP","author":"D Mauro","year":"2005","unstructured":"Mauro D, Schmidt K. Essential SNMP. USA: O\u2019Reilly Media, 2005"},{"key":"2210_CR2","volume-title":"Common information model: implementing the object model for enterprise management","author":"W Bumpus","year":"2000","unstructured":"Bumpus W, Sweitzer J, Thompson P, Westerinen A, Williams R. Common information model: implementing the object model for enterprise management. USA: John Wiley & Sons, 2000"},{"key":"2210_CR3","volume-title":"Windows management instrumentation","author":"M Lavy","year":"2001","unstructured":"Lavy M, Meggitt A. Windows management instrumentation. USA: Sams Publishing, 2001"},{"key":"2210_CR4","volume-title":"WMI essentials for automating Windows management","author":"M Policht","year":"2002","unstructured":"Policht M. WMI essentials for automating Windows management. USA: Sams Publishing, 2002"},{"issue":"8","key":"2210_CR5","doi-asserted-by":"crossref","first-page":"720","DOI":"10.1016\/S0140-3664(99)00232-7","volume":"23","author":"D Gavalas","year":"2000","unstructured":"Gavalas D, Greenwood D, Ghanbari M, O\u2019Mahony M. Advanced network monitoring applications based on mobile\/intelligent agent technology. Computer Communications, 2000, 23(8): 720\u2013730","journal-title":"Computer Communications"},{"issue":"6","key":"2210_CR6","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1016\/j.jnca.2010.03.016","volume":"33","author":"P Ray","year":"2010","unstructured":"Ray P, Parameswaran N, Lewis L. Distributed autonomic management: an approach and experiment towards managing service-centric networks. Journal of Network and Computer Applications, 2010, 33(6): 653\u2013660","journal-title":"Journal of Network and Computer Applications"},{"issue":"1","key":"2210_CR7","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1016\/j.jnca.2005.07.002","volume":"30","author":"K Shin","year":"2007","unstructured":"Shin K, Jung J, Cheon J, Choi S. Real-time network monitoring scheme based on SNMP for dynamic information. Journal of Network and Computer Applications, 2007, 30(1): 331\u2013353","journal-title":"Journal of Network and Computer Applications"},{"key":"2210_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-44564-1_1","volume-title":"Proceedings of the 1st International Workshop on Agent-oriented Software Engineering","author":"M Wooldridge","year":"2001","unstructured":"Wooldridge M, Ciancarini P. Agent-oriented software engineering: the state of the art. In: Proceedings of the 1st International Workshop on Agent-oriented Software Engineering, 2001, 1\u201328"},{"key":"2210_CR9","first-page":"26","volume-title":"IEE Proceedings of Software Engineering","author":"M Wooldridge","year":"1997","unstructured":"Wooldridge M. Agent-based software engineering. In: IEE Proceedings of Software Engineering. 1997, 26\u201337"},{"issue":"3","key":"2210_CR10","doi-asserted-by":"crossref","first-page":"1151","DOI":"10.1016\/j.jnca.2012.01.006","volume":"35","author":"Z Baig","year":"2012","unstructured":"Baig Z. Review: multi-agent systems for protecting critical infrastructures: a survey. Journal of Network and Computer Applications, 2012, 35(3): 1151\u20131161","journal-title":"Journal of Network and Computer Applications"},{"key":"2210_CR11","doi-asserted-by":"crossref","first-page":"543","DOI":"10.1109\/KIMAS.2005.1427141","volume-title":"Proceedings of the 2005 International Conference on Integration of Knowledge Intensive Multi-Agent Systems","author":"B Hands","year":"2005","unstructured":"Hands B, Capretz M.Maintenance and monitoring of remote software using an agent platform. In: Proceedings of the 2005 International Conference on Integration of Knowledge Intensive Multi-Agent Systems. 2005, 543\u2013548"},{"issue":"16","key":"2210_CR12","doi-asserted-by":"crossref","first-page":"3855","DOI":"10.1016\/j.comcom.2008.04.012","volume":"31","author":"C Ramachandran","year":"2008","unstructured":"Ramachandran C, Misra S, Obaidat M. FORK: a novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks. Computer Communications, 2008, 31(16): 3855\u20133869","journal-title":"Computer Communications"},{"issue":"8","key":"2210_CR13","doi-asserted-by":"crossref","first-page":"10320","DOI":"10.1016\/j.eswa.2011.02.115","volume":"38","author":"S Yang","year":"2011","unstructured":"Yang S, Chang Y. An active and intelligent network management system with ontology-based and multi-agent techniques. Expert Systems with Applications, 2011, 38(8): 10320\u201310342","journal-title":"Expert Systems with Applications"},{"issue":"4","key":"2210_CR14","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1631\/jzus.C1101010","volume":"13","author":"H Chen","year":"2012","unstructured":"Chen H, Yu T, Zheng Q, Gu P, Zhang Y. A multi-agent framework for mining semantic relations from linked data. Journal of Zhejiang University-Science C, 2012, 13(4): 295\u2013307","journal-title":"Journal of Zhejiang University-Science C"},{"issue":"2","key":"2210_CR15","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/S0164-1212(02)00092-4","volume":"67","author":"G Helmer","year":"2003","unstructured":"Helmer G, Wong J, Honavar V, Miller L, Wang Y. Lightweight agents for intrusion detection. Journal of Systems and Software, 2003, 67(2): 109\u2013122","journal-title":"Journal of Systems and Software"},{"issue":"3","key":"2210_CR16","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1109\/TSMCC.2003.818944","volume":"33","author":"I Satoh","year":"2003","unstructured":"Satoh I. Building reusable mobile agents for network management. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 2003, 33(3): 350\u2013357","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews"},{"issue":"4","key":"2210_CR17","doi-asserted-by":"crossref","first-page":"712","DOI":"10.1016\/j.comcom.2008.11.038","volume":"32","author":"J Cucurull","year":"2009","unstructured":"Cucurull J, Mart R, Navarro-Arribas G, Robles S, Overeinder B, Borrell J. \u00c1gent mobility architecture based on IEEE-FIPA standards. Computer Communications, 2009, 32(4): 712\u2013729","journal-title":"Computer Communications"},{"issue":"2","key":"2210_CR18","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1016\/j.jss.2008.06.034","volume":"82","author":"D Gavalas","year":"2009","unstructured":"Gavalas D, Tsekouras G, Anagnostopoulos C. A mobile agent platform for distributed network and systems management. Journal of Systems and Software, 2009, 82(2): 355\u2013371","journal-title":"Journal of Systems and Software"},{"issue":"8","key":"2210_CR19","doi-asserted-by":"crossref","first-page":"10987","DOI":"10.1016\/j.eswa.2009.02.060","volume":"36","author":"U Manzoor","year":"2009","unstructured":"Manzoor U, Nefti S. An agent based system for activity monitoring on network-ABSAMN. Expert Systems with Applications, 2009, 36(8): 10987\u201310994","journal-title":"Expert Systems with Applications"},{"issue":"4","key":"2210_CR20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1088\/0957-0233\/20\/4\/045201","volume":"20","author":"S Taylor","year":"2009","unstructured":"Taylor S, Farinholt K, Flynn E, Figueiredo E, Mascarenas D, Moro E, Park G, Todd M, Farrar C. A mobile-agent-based wireless sensing network for structural monitoring applications. Measurement Science and Technology, 2009, 20(4): 1\u201314","journal-title":"Measurement Science and Technology"},{"issue":"6","key":"2210_CR21","doi-asserted-by":"crossref","first-page":"633","DOI":"10.1016\/j.jnca.2010.03.011","volume":"33","author":"B Chen","year":"2010","unstructured":"Chen B. Agent-based artificial immune system approach for adaptive damage detection in monitoring networks. Journal of Network and Computer Applications, 2010, 33(6): 633\u2013645","journal-title":"Journal of Network and Computer Applications"},{"issue":"4","key":"2210_CR22","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1016\/j.infsof.2009.10.006","volume":"52","author":"A Janik","year":"2010","unstructured":"Janik A, Zielinski K. AAOP-based dynamically reconfigurable monitoring system. Information and Software Technology, 2010, 52(4): 380\u2013396","journal-title":"Information and Software Technology"},{"key":"2210_CR23","first-page":"132","volume-title":"Proceedings of the 5th IEEE\/ACS International Conference on Computer Systems and Applications","author":"Y Al-Obasiat","year":"2007","unstructured":"Al-Obasiat Y, Braun R. A multi-agent flexible architecture for autonomic services and network management. In: Proceedings of the 5th IEEE\/ACS International Conference on Computer Systems and Applications. 2007, 132\u2013138"},{"issue":"2","key":"2210_CR24","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1016\/j.eswa.2004.10.006","volume":"28","author":"S Park","year":"2005","unstructured":"Park S, Sugumaran V. Designing multi-agent systems: a framework and application. Expert Systems with Applications, 2005, 28(2): 259\u2013271","journal-title":"Expert Systems with Applications"},{"key":"2210_CR25","first-page":"452","volume-title":"Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design","author":"Z Rao","year":"2007","unstructured":"Rao Z, Ghenniwa H, Shami A. AGeMoS: an agent-based generic monitoring approach for self-management systems. In: Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design. 2007, 452\u2013457"},{"issue":"9","key":"2210_CR26","doi-asserted-by":"crossref","first-page":"1745","DOI":"10.1016\/j.comnet.2008.02.015","volume":"52","author":"F Wuhib","year":"2008","unstructured":"Wuhib F, Dam M, Stadler R. Decentralized detection of global threshold crossings using aggregation trees. Computer Networks, 2008, 52(9): 1745\u20131761","journal-title":"Computer Networks"},{"issue":"4","key":"2210_CR27","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1016\/j.autcon.2008.10.010","volume":"18","author":"Y Hsieh","year":"2009","unstructured":"Hsieh Y, Hung Y. A scalable IT infrastructure for automated monitoring systems based on the distributed computing technique using simple object access protocol Web-services. Automation in Construction, 2009, 18(4): 424\u2013433","journal-title":"Automation in Construction"},{"key":"2210_CR28","first-page":"111","volume-title":"Proceedings of the 2010 International Conference on Web Information Systems and Mining","author":"J Ge","year":"2010","unstructured":"Ge J, Zhang B, Fang Y. Research on the resource monitoring model under cloud computing environment. In: Proceedings of the 2010 International Conference on Web Information Systems and Mining. 2010, 111\u2013118"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-013-2210-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11704-013-2210-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-013-2210-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T21:01:17Z","timestamp":1559422877000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11704-013-2210-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,3]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,8]]}},"alternative-id":["2210"],"URL":"https:\/\/doi.org\/10.1007\/s11704-013-2210-7","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,5,3]]}}}