{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:58:19Z","timestamp":1730285899983,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1109\/noms.2008.4575147","type":"proceedings-article","created":{"date-parts":[[2008,9,16]],"date-time":"2008-09-16T19:17:28Z","timestamp":1221592648000},"page":"295-301","source":"Crossref","is-referenced-by-count":0,"title":["On the complexity of determining autonomic policy constrained behaviour"],"prefix":"10.1109","author":[{"given":"Mark","family":"Burgess","sequence":"first","affiliation":[]},{"given":"Lars","family":"Kristiansen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICONIP.1999.845663"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/262793.262811"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/283699.283742"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1002\/047086107X"},{"key":"12","first-page":"63","article-title":"the maelstrom: network service debugging via ineffective procedures","author":"couch","year":"2001","journal-title":"Proceedings of the Fifteenth Systems Administration Conference (LISA XV) (USENIX Association Berkeley CA)"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2004.04.002"},{"year":"0","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2005.1440836"},{"journal-title":"Elements of the Theory of Computation","year":"1997","author":"lewis","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/BF02283186"},{"key":"6","first-page":"197","article-title":"autonomic computing approximated by fixed point promises","author":"burgess","year":"2006","journal-title":"Proceedings of the 1st IEEE International Workshop on Modelling Autonomic Communications Environments (MACE) Multicon verlag 2006 ISBN 3-930736-05-5"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2003.12.004"},{"journal-title":"Handbook of Network and System Administration chapter Complexity of System Configuration Management","year":"2007","author":"sun","key":"4"},{"key":"9","first-page":"309","article-title":"a site configuration engine","volume":"8","author":"burgess","year":"1995","journal-title":"Computing systems (MIT Press Cambridge MA)"},{"key":"8","first-page":"1404","article-title":"policy hierarchies for distributed systems management","volume":"11","author":"sloman","year":"1993","journal-title":"Journal of Network and Systems Management"}],"event":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","start":{"date-parts":[[2008,4,7]]},"location":"Salvador, Bahia, Brazil","end":{"date-parts":[[2008,4,11]]}},"container-title":["NOMS 2008 - 2008 IEEE Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4567164\/4575087\/04575147.pdf?arnumber=4575147","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T19:32:39Z","timestamp":1489692759000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4575147\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/noms.2008.4575147","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}