{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T12:52:54Z","timestamp":1648903974729},"reference-count":18,"publisher":"Elsevier BV","issue":"3-4","license":[{"start":{"date-parts":[[2001,2,1]],"date-time":"2001-02-01T00:00:00Z","timestamp":980985600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2001,2]]},"DOI":"10.1016\/s0140-3664(00)00242-5","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T19:45:13Z","timestamp":1027626313000},"page":"422-433","source":"Crossref","is-referenced-by-count":0,"title":["A reversing traversal algorithm to predict deleting node for the optimal k-node set reliability with capacity constraint of distributed systems"],"prefix":"10.1016","volume":"24","author":[{"given":"Yi-Shiung","family":"Yeh","sequence":"first","affiliation":[]},{"given":"Chin-Ching","family":"Chiu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/S0140-3664(00)00242-5_BIB1","first-page":"3","article-title":"Three-mode failure model for reliability analysis of distributed programs","volume":"E80-D","author":"Tsuchiya","year":"1997","journal-title":"IEICE Trans. Inf. Systems"},{"issue":"2","key":"10.1016\/S0140-3664(00)00242-5_BIB2","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1109\/71.127256","article-title":"Reliability analysis of distributed systems based on a fast reliability algorithm","volume":"3","author":"Chen","year":"1992","journal-title":"IEEE Trans. Parallel Distributed Systems"},{"issue":"3","key":"10.1016\/S0140-3664(00)00242-5_BIB3","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1109\/24.257824","article-title":"A heuristic task assignment algorithm to maximize reliability of a distributed system","volume":"R-42","author":"Hwang","year":"1993","journal-title":"IEEE Trans. Reliability"},{"issue":"5","key":"10.1016\/S0140-3664(00)00242-5_BIB4","doi-asserted-by":"crossref","first-page":"809","DOI":"10.1016\/S0026-2714(96)00145-X","article-title":"Pathset, enumeration of directed graphs by the set theoretic method","volume":"37","author":"Aziz","year":"1997","journal-title":"Microelectron Reliab."},{"issue":"3","key":"10.1016\/S0140-3664(00)00242-5_BIB5","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1109\/24.257825","article-title":"A generalized algorithm for evaluation distributed program reliability","volume":"42","author":"Kumar","year":"1993","journal-title":"IEEE Trans. Reliability"},{"issue":"2","key":"10.1016\/S0140-3664(00)00242-5_BIB6","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/S0164-1212(97)00005-8","article-title":"Algorithms for reliability-oriented module allocation in distributed computing systems","volume":"40","author":"Tom","year":"1998","journal-title":"J. Systems Software"},{"issue":"3","key":"10.1016\/S0140-3664(00)00242-5_BIB7","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1109\/24.326428","article-title":"Calculation of node-pair reliability in large networks with unreliable nodes","volume":"43","author":"Torreri","year":"1994","journal-title":"IEEE Trans. Reliability"},{"issue":"2","key":"10.1016\/S0140-3664(00)00242-5_BIB8","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1109\/24.510811","article-title":"Reliability optimization of series \u2014 parallel systems using a genetic algorithm","volume":"45","author":"Coit","year":"1996","journal-title":"IEEE Trans. Reliability"},{"key":"10.1016\/S0140-3664(00)00242-5_BIB9","first-page":"4676","article-title":"Reliability optimization of computer communication networks using genetic algorithms","volume":"5","author":"Altiparmak","year":"1998","journal-title":"Proc. IEEE Int. Conf. Syst. Man Cybern."},{"issue":"3","key":"10.1016\/S0140-3664(00)00242-5_BIB10","article-title":"New reliability evaluation algorithms for distributed computing systems","volume":"8","author":"Lin","year":"1992","journal-title":"J. Inf. Sci. Engng"},{"issue":"1\/2","key":"10.1016\/S0140-3664(00)00242-5_BIB11","article-title":"Efficient algorithms for reliability analysis of distributed computing systems","volume":"17","author":"Lin","year":"1999","journal-title":"J. Inf. Sci. Engng"},{"issue":"18","key":"10.1016\/S0140-3664(00)00242-5_BIB12","doi-asserted-by":"crossref","first-page":"1879","DOI":"10.1016\/S0169-7552(98)00288-8","article-title":"Analysis of a general limited scheduling mechanism for a distributed communication systems","volume":"31","author":"Hwang","year":"1999","journal-title":"Computer Network"},{"issue":"4","key":"10.1016\/S0140-3664(00)00242-5_BIB13","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/0898-1221(94)00242-D","article-title":"Reliability optimization of distributed computing systems subject to capacity constraint","volume":"29","author":"Chen","year":"2000","journal-title":"J. Computers Math. Appl."},{"issue":"3","key":"10.1016\/S0140-3664(00)00242-5_BIB14","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/0898-1221(94)00227-C","article-title":"heuristic approach for reliability optimization of distributed computing systems subject to capacity constraints","volume":"29","author":"Chen","year":"1995","journal-title":"J. Computers Math. Appl."},{"issue":"10","key":"10.1016\/S0140-3664(00)00242-5_BIB15","doi-asserted-by":"crossref","first-page":"1224","DOI":"10.1109\/TC.1987.1676862","article-title":"syrel: a symbolic reliability algorithm based on path and cuset methods","volume":"C-36","author":"Hariri","year":"1987","journal-title":"IEEE Trans. Computers"},{"issue":"10","key":"10.1016\/S0140-3664(00)00242-5_BIB16","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/S0898-1221(97)00210-1","article-title":"Heuristic approach to generating file spanning trees fro reliability analysis of distributed computing systems","volume":"34","author":"Chen","year":"1997","journal-title":"J. Computers Math. Appl."},{"issue":"3","key":"10.1016\/S0140-3664(00)00242-5_BIB17","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/4434.708255","article-title":"Optimal task assignment in heterogeneous distributed computing systems","volume":"6","author":"Kafil","year":"1998","journal-title":"IEEE Concurrency"},{"issue":"8","key":"10.1016\/S0140-3664(00)00242-5_BIB18","doi-asserted-by":"crossref","first-page":"1217","DOI":"10.1016\/S0026-2714(96)00289-2","article-title":"Bound for reliability of k-within connected-(v,s) out-of (m,n) failure systems","volume":"37","author":"Makri","year":"1997","journal-title":"Microelectron Reliab."}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366400002425?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366400002425?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,22]],"date-time":"2019-04-22T07:57:07Z","timestamp":1555919827000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366400002425"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,2]]},"references-count":18,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2001,2]]}},"alternative-id":["S0140366400002425"],"URL":"https:\/\/doi.org\/10.1016\/s0140-3664(00)00242-5","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2001,2]]}}}