{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T16:43:07Z","timestamp":1715013787953},"reference-count":33,"publisher":"Elsevier","isbn-type":[{"value":"9780128036631","type":"print"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1016\/b978-0-12-803663-1.00012-7","type":"book-chapter","created":{"date-parts":[[2016,5,13]],"date-time":"2016-05-13T19:35:46Z","timestamp":1463168146000},"page":"393-416","source":"Crossref","is-referenced-by-count":0,"title":["A failure detector based on processes\u2019 relevance and the confidence degree in the system for self-healing in ubiquitous environments"],"prefix":"10.1016","author":[{"given":"A.G.d.M.","family":"Rossetto","sequence":"first","affiliation":[]},{"given":"C.O.","family":"Rolim","sequence":"additional","affiliation":[]},{"given":"V.","family":"Leithardt","sequence":"additional","affiliation":[]},{"given":"G.A.","family":"Borges","sequence":"additional","affiliation":[]},{"given":"C.F.R.","family":"Geyer","sequence":"additional","affiliation":[]},{"given":"L.","family":"Arantes","sequence":"additional","affiliation":[]},{"given":"P.","family":"Sens","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/B978-0-12-803663-1.00012-7_bb0010","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/j.csi.2011.03.004","article-title":"A review of wireless sensors and networks\u2019 applications in agriculture","volume":"36","author":"Abbasi","year":"2014","journal-title":"Comput. Stand. Interfaces"},{"key":"10.1016\/B978-0-12-803663-1.00012-7_bb0015","series-title":"Handbook of Research on Mobility and Computing: Evolving Technologies and Ubiquitous Impacts","first-page":"20","article-title":"Unreliable failure detectors for mobile ad hoc networks","author":"Arantes","year":"2010"},{"key":"10.1016\/B978-0-12-803663-1.00012-7_bb0020","series-title":"DSN","first-page":"635","article-title":"Performance analysis of a hierarchical failure detector","volume":"vol. 3","author":"Bertier","year":"2003"},{"key":"10.1016\/B978-0-12-803663-1.00012-7_bb0025","first-page":"1","article-title":"Self-healing for pervasive computing systems","author":"Bourdenas","year":"2010"},{"key":"10.1016\/B978-0-12-803663-1.00012-7_bb0030","series-title":"Joint Systems and Software Engineering Symposium, Falls Church, VA","article-title":"A middleware for dependable distributed real-time systems","author":"Bracewell","year":"2003"},{"key":"10.1016\/B978-0-12-803663-1.00012-7_bb0035","series-title":"31st International Conference on Distributed Computing Systems (ICDCS), 2011","first-page":"665","article-title":"Smart redundancy for distributed computation","author":"Brun","year":"2011"},{"key":"10.1016\/B978-0-12-803663-1.00012-7_bb0040","series-title":"15th IEEE International Symposium on Object\/Component\/Service-Oriented Real-Time Distributed Computing Workshops (ISORCW), 2012","first-page":"48","article-title":"A novel self-adaptive fault-tolerant mechanism and its application for a dynamic pervasive computing environment","author":"Cai","year":"2012"},{"issue":"2","key":"10.1016\/B978-0-12-803663-1.00012-7_bb0045","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1145\/226643.226647","article-title":"Unreliable failure detectors for reliable distributed systems","volume":"43","author":"Chandra","year":"1996","journal-title":"J. ACM"},{"issue":"5","key":"10.1016\/B978-0-12-803663-1.00012-7_bb0050","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1109\/TC.2002.1004595","article-title":"On the quality of service of failure detectors","volume":"51","author":"Chen","year":"2002","journal-title":"IEEE Trans. Comput."},{"issue":"1","key":"10.1016\/B978-0-12-803663-1.00012-7_bb0055","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MTAS.2005.1407746","article-title":"Towards fault tolerance pervasive computing","volume":"24","author":"Chetan","year":"2005","journal-title":"IEEE Technol. Soc. Mag."},{"key":"10.1016\/B978-0-12-803663-1.00012-7_bb0060","series-title":"Shared memory vs message passing","author":"Delporte-Gallet","year":"2003"},{"key":"10.1016\/B978-0-12-803663-1.00012-7_bb0065","series-title":"Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing","first-page":"338","article-title":"The weakest failure detectors to solve certain fundamental problems in distributed computing","author":"Delporte-Gallet","year":"2004"},{"key":"10.1016\/B978-0-12-803663-1.00012-7_bb0070","first-page":"185","article-title":"An overview of self-protection and self-healing in wireless sensor networks","author":"Gaber","year":"2014"},{"issue":"1","key":"10.1016\/B978-0-12-803663-1.00012-7_bb0075","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1147\/sj.421.0005","article-title":"The dawning of the autonomic computing era","volume":"42","author":"Ganek","year":"2003","journal-title":"IBM Syst. J."},{"issue":"4","key":"10.1016\/B978-0-12-803663-1.00012-7_bb0080","doi-asserted-by":"crossref","first-page":"1174","DOI":"10.1016\/j.jnca.2013.02.005","article-title":"Fault tolerance in wireless sensor network using hand-off and dynamic power adjustment approach","volume":"36","author":"Geeta","year":"2013","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"10.1016\/B978-0-12-803663-1.00012-7_bb0085","doi-asserted-by":"crossref","first-page":"2164","DOI":"10.1016\/j.dss.2006.06.011","article-title":"Self-healing systems survey and synthesis","volume":"42","author":"Ghosh","year":"2007","journal-title":"Decis. Support Syst."},{"key":"10.1016\/B978-0-12-803663-1.00012-7_bb0090","series-title":"Workshop on Adaptive Distributed Systems (WADiS03)","first-page":"22","article-title":"Two-ways adaptive failure detection with the \u03d5-failure detector","author":"Hayashibara","year":"2003"},{"key":"10.1016\/B978-0-12-803663-1.00012-7_bb0095","series-title":"Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems, 2004","first-page":"66","article-title":"The \u03c6 accrual failure detector","author":"Hayashibara","year":"2004"},{"key":"10.1016\/B978-0-12-803663-1.00012-7_bb0100","series-title":"6th Asia-Pacific Symposium on Information and Telecommunication Technologies, 2005. APSITT 2005 Proceedings","first-page":"293","article-title":"A proposal of forwarding method for urgent messages on an ubiquitous wireless sensor network","author":"Ishibashi","year":"2005"},{"key":"10.1016\/B978-0-12-803663-1.00012-7_bb0105","series-title":"ACM SIGCOMM Computer Communication Review","first-page":"314","article-title":"Congestion avoidance and control","volume":"vol. 18","author":"Jacobson","year":"1988"},{"issue":"1","key":"10.1016\/B978-0-12-803663-1.00012-7_bb0110","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MC.2003.1160055","article-title":"The vision of autonomic computing","volume":"36","author":"Kephart","year":"2003","journal-title":"Computer"},{"key":"10.1016\/B978-0-12-803663-1.00012-7_bb0115","series-title":"International Conference on Complex, Intelligent and Software Intensive Systems (CISIS), 2010","first-page":"482","article-title":"A failure detection system for large scale distributed systems","author":"Lavinia","year":"2010"},{"key":"10.1016\/B978-0-12-803663-1.00012-7_bb0120","series-title":"Proc. of NSDI","article-title":"Improving availability in distributed systems with failure informers","author":"Leners","year":"2013"},{"key":"10.1016\/B978-0-12-803663-1.00012-7_bb0125","series-title":"43rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), 2013","first-page":"351","article-title":"Asynchronous implementation of failure detectors","author":"Mostefaoui","year":"2003"},{"key":"10.1016\/B978-0-12-803663-1.00012-7_bb0130","series-title":"Planetlab","year":"2014"},{"issue":"1","key":"10.1016\/B978-0-12-803663-1.00012-7_bb0135","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/s00607-010-0107-y","article-title":"A survey on self-healing systems: approaches and systems","volume":"91","author":"Psaier","year":"2011","journal-title":"Computing"},{"key":"10.1016\/B978-0-12-803663-1.00012-7_bb0140","series-title":"International Conference on Health Informatics","article-title":"An architecture for resilient ubiquitous systems","author":"Rossetto","year":"2014"},{"key":"10.1016\/B978-0-12-803663-1.00012-7_bb0145","series-title":"Impact: an unreliable failure detector based on processes relevance and the confidence degree in the system","author":"Rossetto","year":"2015"},{"key":"10.1016\/B978-0-12-803663-1.00012-7_bb0150","series-title":"Proceedings of the 2007 ACM Symposium on Applied Computing","first-page":"551","article-title":"A new adaptive accrual failure detector for dependable distributed systems","author":"Satzger","year":"2007"},{"key":"10.1016\/B978-0-12-803663-1.00012-7_bb0155","series-title":"Third International Conference on Information Technology: New Generations, 2006. ITNG 2006","first-page":"306","article-title":"Marks (middleware adaptability for resource discovery, knowledge usability and self-healing) for mobile devices of pervasive computing environments","author":"Sharmin","year":"2006"},{"issue":"1","key":"10.1016\/B978-0-12-803663-1.00012-7_bb0160","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/s11334-005-0001-5","article-title":"Autonomic computing","volume":"1","author":"Sterritt","year":"2005","journal-title":"Innov. Syst. Softw. Eng."},{"issue":"3","key":"10.1016\/B978-0-12-803663-1.00012-7_bb0165","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1038\/scientificamerican0991-94","article-title":"The computer for the 21st century","volume":"265","author":"Weiser","year":"1991","journal-title":"Sci. Am."},{"key":"10.1016\/B978-0-12-803663-1.00012-7_bb0170","series-title":"Ninth International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS), 2015","first-page":"179","article-title":"A software chain approach to big data stream processing and analytics","author":"Xhafa","year":"2015"}],"container-title":["Pervasive Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780128036631000127?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780128036631000127?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,9,12]],"date-time":"2018-09-12T02:24:44Z","timestamp":1536719084000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/B9780128036631000127"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9780128036631"],"references-count":33,"URL":"https:\/\/doi.org\/10.1016\/b978-0-12-803663-1.00012-7","relation":{},"subject":[],"published":{"date-parts":[[2016]]}}}