{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:45:03Z","timestamp":1729647903625,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/noms.2016.7502977","type":"proceedings-article","created":{"date-parts":[[2016,7,4]],"date-time":"2016-07-04T21:07:22Z","timestamp":1467666442000},"page":"1143-1148","source":"Crossref","is-referenced-by-count":7,"title":["Towards self-adaptive network management for a recursive network architecture"],"prefix":"10.1109","author":[{"given":"Jason","family":"Barron","sequence":"first","affiliation":[]},{"given":"Micheal","family":"Crotty","sequence":"additional","affiliation":[]},{"given":"Ehsan","family":"Elahi","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Riggio","sequence":"additional","affiliation":[]},{"given":"Diego R.","family":"Lopez","sequence":"additional","affiliation":[]},{"given":"Miguel Ponce","family":"de Leon","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Building a scalable event processing system with messaging and policies&#x2014;test and evaluation of rabbitmq and drools expert","year":"2013","author":"dawar","key":"ref33"},{"year":"2015","key":"ref32","article-title":"Advanced message queuing protocol"},{"journal-title":"RabbitMQ author=Pivatol howpublished =","year":"0","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2002.1067737"},{"article-title":"Stringtemplate template engine","year":"0","author":"parr","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"ref10","first-page":"1","article-title":"Com-posing software defined networks","author":"monsanto","year":"2013","journal-title":"NSDI"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18378-2_19"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2034574.2034812"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342451"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1592681.1592684"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2103621.2103685"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.10.017"},{"key":"ref17","first-page":"30","article-title":"Software-defined networking","volume":"17","author":"mckeown","year":"2009","journal-title":"INFOCOM Keynote Talk"},{"key":"ref18","article-title":"Network function virtualization: State-of-the-art and research challenges","author":"mijumbi","year":"2015","journal-title":"Communications Surveys & Tutorials IEEE"},{"journal-title":"Patterns in Network Architecture A Return to Fundamentals","year":"2007","author":"day","key":"ref19"},{"key":"ref28","article-title":"Sparql\/update: A language for updating rdf graphs","volume":"15","author":"seaborne","year":"2008","journal-title":"W3C Member Submission"},{"article-title":"IETF RFC 0792: Internet control message protocol","year":"1981","author":"postel","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/S1071-5819(02)00127-1"},{"article-title":"IETF RFC 1157: A simple network management protocol","year":"1990","author":"case","key":"ref3"},{"article-title":"IETF RFC 4741: Netconf configuration protocol","year":"2006","author":"enns","key":"ref6"},{"year":"0","key":"ref29","article-title":"Fuseki: serving RDF data over HTTP"},{"year":"2006","key":"ref5","article-title":"MOME project: Cluster of european project aimed at monitoring and measurement"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863957"},{"key":"ref7","article-title":"Roadmap to self managing technology","author":"computing","year":"2006","journal-title":"An IBM Journal Paper"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1592681.1592683"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.07.033"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544079"},{"key":"ref22","article-title":"The essence of winning and losing","author":"boyd","year":"1996","journal-title":"Unpublished lecture notes"},{"journal-title":"Integrated Management of Networked Systems Concepts Architectures and Their Operational Application","year":"1999","author":"hegering","key":"ref21"},{"key":"ref24","first-page":"780","article-title":"Semantic web technologies to aid dominance detection for access control policies","author":"barron","year":"2013","journal-title":"2013 IFIP\/IEEE International Symposium on Integrated Network Management (IM 2013) IM"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-009-9119-3"},{"key":"ref26","article-title":"Owl 2 web ontology language: Structural specification and functional-style syntax","volume":"27","author":"motik","year":"2009","journal-title":"W3C Recommendation"},{"article-title":"Rina implementation","year":"2015","author":"stack","key":"ref25"}],"event":{"name":"NOMS 2016 - 2016 IEEE\/IFIP Network Operations and Management Symposium","start":{"date-parts":[[2016,4,25]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2016,4,29]]}},"container-title":["NOMS 2016 - 2016 IEEE\/IFIP Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7499631\/7502779\/07502977.pdf?arnumber=7502977","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,30]],"date-time":"2016-09-30T02:21:01Z","timestamp":1475202061000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7502977\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/noms.2016.7502977","relation":{},"subject":[],"published":{"date-parts":[[2016,4]]}}}