{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:18:58Z","timestamp":1729624738595,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,5]]},"DOI":"10.1109\/inm.2011.5990694","type":"proceedings-article","created":{"date-parts":[[2011,8,25]],"date-time":"2011-08-25T15:57:47Z","timestamp":1314287867000},"page":"217-224","source":"Crossref","is-referenced-by-count":20,"title":["Pattern-based composite application deployment"],"prefix":"10.1109","author":[{"given":"Tamar","family":"Eilam","sequence":"first","affiliation":[]},{"given":"Michael","family":"Elder","sequence":"additional","affiliation":[]},{"given":"Alexander V.","family":"Konstantinou","sequence":"additional","affiliation":[]},{"given":"Ed","family":"Snible","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"159","article-title":"Strider: A black-box, state-based approach to change and configuration management and support","author":"wang","year":"2003","journal-title":"Usenix LISA"},{"journal-title":"Dancing Links","year":"0","author":"knuth","key":"17"},{"key":"18","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/ICAC.2004.1301344","article-title":"Discovering correctness constraints for self-management of system configuration","author":"kycyman","year":"2004","journal-title":"ICAC '04 Proceedings of the First International Conference on Autonomic Computing"},{"journal-title":"Rational Software Architect (RSA)","year":"2008","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2004.1317679"},{"journal-title":"A Technique for Implementing Back-track Algorithms and its Application","year":"0","author":"hitotumatu","key":"13"},{"journal-title":"Tivoli Provisioning Manager (TPM)","year":"2006","key":"14"},{"journal-title":"Computers and Intractability A Guide to the Theory of NP-Completeness","year":"1979","author":"garey","key":"11"},{"key":"12","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1145\/1496909.1496915","article-title":"The smart-frog configuration management framework","volume":"43","author":"goldsack","year":"2009","journal-title":"SIGOPS Oper Syst Rev"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1147\/sj.381.0032"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2001.918085"},{"key":"20","article-title":"Automatic miscoguration troubleshooting with peerpressure","author":"wang","year":"2004","journal-title":"USENIX Symposium on Operating Systems Design and Implementation (OSDI)"},{"key":"2","article-title":"Lcfg: The next generation","author":"anderson","year":"2002","journal-title":"UKUUG Winter Conference"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.453.0481"},{"key":"10","article-title":"Model driven provisioning: Bridging the gap between declarative object models and procedural provisioning tools","author":"el maghraoui","year":"2006","journal-title":"Middleware Volume 4290 of LNCS"},{"key":"7","first-page":"31","article-title":"Fundamental theory for typed attributed graphs and graph transformation based on adhesive hlr categories","volume":"74","author":"ehrig","year":"2006","journal-title":"Fundam Inf"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1287\/moor.4.3.233"},{"key":"5","article-title":"Cfengine: A site configuration engine","volume":"8","author":"burgess","year":"1995","journal-title":"USENIX Computing Systems"},{"key":"4","article-title":"Pattern based SOA deployment","author":"arnold","year":"2007","journal-title":"ICSOC Volume 4749 of LNCS"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1607881"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2005.1440790"}],"event":{"name":"2011 IFIP\/IEEE International Symposium on Integrated Network Management (IM 2011)","start":{"date-parts":[[2011,5,23]]},"location":"Dublin, Ireland","end":{"date-parts":[[2011,5,27]]}},"container-title":["12th IFIP\/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5976317\/5990489\/05990694.pdf?arnumber=5990694","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T05:10:27Z","timestamp":1497935427000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5990694\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/inm.2011.5990694","relation":{},"subject":[],"published":{"date-parts":[[2011,5]]}}}