{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T17:00:20Z","timestamp":1772298020693,"version":"3.50.1"},"reference-count":33,"publisher":"Informa UK Limited","issue":"9","funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology of Taiwan","doi-asserted-by":"publisher","award":["MOST 105-2221-E-141-005"],"award-info":[{"award-number":["MOST 105-2221-E-141-005"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Computer Mathematics"],"published-print":{"date-parts":[[2018,9,2]]},"DOI":"10.1080\/00207160.2017.1336230","type":"journal-article","created":{"date-parts":[[2017,5,30]],"date-time":"2017-05-30T04:18:03Z","timestamp":1496117883000},"page":"1761-1774","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":20,"title":["Sensitivity analysis of the machine repair problem with general repeated attempts"],"prefix":"10.1080","volume":"95","author":[{"given":"Dong-Yuh","family":"Yang","sequence":"first","affiliation":[{"name":"Institute of Information and Decision Sciences, National Taipei University of Business, Taipei, Taiwan"}]},{"given":"Ya-Dun","family":"Chang","sequence":"additional","affiliation":[{"name":"Institute of Information and Decision Sciences, National Taipei University of Business, Taipei, Taiwan"}]}],"member":"301","published-online":{"date-parts":[[2017,6,25]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1007\/BF02564721"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1016\/S0895-7177(99)00128-4"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78725-9"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(00)00330-1"},{"key":"CIT0005","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1111\/j.2517-6161.1951.tb00071.x","volume":"13","author":"Benson F.","year":"1951","journal-title":"J. R. Stat. Soc., Ser. B"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1002\/nav.10069"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2005.05.012"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2013.12.108"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1017\/S0305004100030437"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2010.09.040"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1007\/BF01158472"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(97)00170-7"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-2977-8"},{"key":"CIT0014","first-page":"245","volume-title":"Teletraffic Analysis and Computer Performance Evaluation","author":"Fayolle G.","year":"1986"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2014.01.065"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1520-6750(199908)46:5<561::AID-NAV7>3.0.CO;2-G"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1016\/0305-0548(94)90075-2"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(96)90068-5"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2006.02.036"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2003.10.013"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2007.07.004"},{"key":"CIT0022","first-page":"197","volume":"5","author":"Ke J.-C.","year":"2010","journal-title":"Int. J. Serv. Oper. Inf."},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1081\/STM-200056021"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2003.09.019"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1080\/00207548508904696"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1080\/10020070612330017"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.3934\/jimo.2011.7.655"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1016\/j.cam.2009.07.043"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1016\/S0360-8352(96)00313-0"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1080\/02533839.2012.757050"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1007\/BF01158899"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28540-0_2"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1016\/j.jkss.2012.06.002"}],"container-title":["International Journal of Computer Mathematics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/00207160.2017.1336230","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T11:55:01Z","timestamp":1719230101000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/00207160.2017.1336230"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,25]]},"references-count":33,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2017,6,26]]},"published-print":{"date-parts":[[2018,9,2]]}},"alternative-id":["10.1080\/00207160.2017.1336230"],"URL":"https:\/\/doi.org\/10.1080\/00207160.2017.1336230","relation":{},"ISSN":["0020-7160","1029-0265"],"issn-type":[{"value":"0020-7160","type":"print"},{"value":"1029-0265","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6,25]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=gcom20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=gcom20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}