{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T04:50:45Z","timestamp":1749099045892,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642205880"},{"type":"electronic","value":"9783642205897"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20589-7_14","type":"book-chapter","created":{"date-parts":[[2011,4,19]],"date-time":"2011-04-19T01:11:00Z","timestamp":1303175460000},"page":"223-238","source":"Crossref","is-referenced-by-count":1,"title":["Network Monitoring with Constraint Programming: Preliminary Specification and Analysis"],"prefix":"10.1007","author":[{"given":"Pedro","family":"Salgueiro","sequence":"first","affiliation":[]},{"given":"Salvador","family":"Abreu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","volume-title":"Handbook of constraint programming","author":"F. Rossi","year":"2006","unstructured":"Rossi, F., Van Beek, P., Walsh, T.: Handbook of constraint programming. Elsevier Science, Amsterdam (2006)"},{"key":"14_CR2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511615320","volume-title":"Principles of constraint programming","author":"K.R. Apt","year":"2003","unstructured":"Apt, K.R.: Principles of constraint programming. Cambridge Univ. Pr., Cambridge (2003)"},{"key":"14_CR3","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45945-6","volume-title":"Programming Constraint Services","author":"C. Schulte","year":"2002","unstructured":"Schulte, C.: Programming Constraint Services. LNCS (LNAI), vol.\u00a02302. Springer, Heidelberg (2002)"},{"issue":"111","key":"14_CR4","first-page":"3","volume":"2003","author":"R.C. Harlan","year":"2003","unstructured":"Harlan, R.C.: Network management with nagios. Linux J.\u00a02003(111), 3 (2003)","journal-title":"Linux J."},{"key":"14_CR5","volume-title":"Nagios: System and network monitoring","author":"W. Barth","year":"2006","unstructured":"Barth, W.: Nagios: System and network monitoring. No Starch Press, San Francisco (2006)"},{"key":"14_CR6","first-page":"229","volume-title":"LISA 1999: Proceedings of the 13th USENIX Conference on System Administration","author":"M. Roesch","year":"1999","unstructured":"Roesch, M.: Snort - lightweight intrusion detection for networks. In: LISA 1999: Proceedings of the 13th USENIX Conference on System Administration, pp. 229\u2013238. USENIX Association, Berkeley (1999)"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Beale, J.: Snort 2.1 Intrusion Detection, 2nd edn. Syngress Publishing (2004)","DOI":"10.1016\/B978-193183604-3\/50006-0"},{"issue":"6","key":"14_CR8","first-page":"542","volume":"2001","author":"D. Diaz","year":"2001","unstructured":"Diaz, D., Codognet, P.: Design and implementation of the gnu prolog system. Journal of Functional and Logic Programming\u00a02001(6), 542 (2001)","journal-title":"Journal of Functional and Logic Programming"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Carlsson, M., Ottosson, G., Carlson, B.: An open-ended finite domain constraint solver. LNCS, pp. 191\u2013206 (1997)","DOI":"10.1007\/BFb0033845"},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1007\/978-3-540-30201-8_45","volume-title":"Principles and Practice of Constraint Programming \u2013 CP 2004","author":"C. Schulte","year":"2004","unstructured":"Schulte, C., Stuckey, P.J.: Speeding up constraint propagation. In: Wallace, M. (ed.) CP 2004. LNCS, vol.\u00a03258, pp. 619\u2013633. Springer, Heidelberg (2004)"},{"key":"14_CR11","unstructured":"Gecode\/R Team. Gecode\/R: Constraint Programming in Ruby, \n                    \n                      http:\/\/gecoder.org\/"},{"key":"14_CR12","unstructured":"Correia, M., Barahona, P.: Overview of the CaSPER* Constraint Solvers. In: Third International CSP Solver Competition, p. 15 (2008)"},{"key":"14_CR13","unstructured":"tcpdump web page (April 2009), \n                    \n                      http:\/\/www.tcpdump.org\/"},{"issue":"6","key":"14_CR14","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1145\/352029.352035","volume":"35","author":"A. Deursen Van","year":"2000","unstructured":"Van Deursen, A., Visser, J.: Domain-specific languages: An annotated bibliography. ACM Sigplan Notices\u00a035(6), 26\u201336 (2000)","journal-title":"ACM Sigplan Notices"},{"key":"14_CR15","volume-title":"Constraint-based local search","author":"P. Hentenryck Van","year":"2005","unstructured":"Van Hentenryck, P., Michel, L.: Constraint-based local search. MIT Press, Cambridge (2005)"},{"key":"14_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/3-540-45322-9_5","volume-title":"Stochastic Algorithms: Foundations and Applications","author":"P. Codognet","year":"2001","unstructured":"Codognet, P., D\u00edaz, D.: Yet another local search method for constraint solving. In: Steinh\u00f6fel, K. (ed.) SAGA 2001. LNCS, vol.\u00a02264, pp. 73\u201390. Springer, Heidelberg (2001)"},{"issue":"4\/5","key":"14_CR17","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1147\/rd.494.0589","volume":"49","author":"J.A. Kahle","year":"2005","unstructured":"Kahle, J.A., Day, M.N., Hofstee, H.P., Johns, C.R., Maeurer, T.R., Shippy, D.: Introduction to the Cell multiprocessor. IBM Journal of Research and Development\u00a049(4\/5), 589\u2013604 (2005)","journal-title":"IBM Journal of Research and Development"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Abreu, S., Diaz, D., Codognet, P.: Parallel local search for solving constraint problems on the cell broadband engine (preliminary results). CoRR, abs\/0910.1264 (2009)","DOI":"10.4204\/EPTCS.5.8"}],"container-title":["Lecture Notes in Computer Science","Applications of Declarative Programming and Knowledge Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20589-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T00:11:31Z","timestamp":1558570291000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20589-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642205880","9783642205897"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20589-7_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}