{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:02:35Z","timestamp":1730289755361,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/pimrc.2005.1651752","type":"proceedings-article","created":{"date-parts":[[2006,8,2]],"date-time":"2006-08-02T20:10:31Z","timestamp":1154549431000},"page":"1801-1805","source":"Crossref","is-referenced-by-count":3,"title":["Conflict detection and resolution in QoS policy based management"],"prefix":"10.1109","volume":"3","author":[{"given":"H.","family":"Moungla","sequence":"first","affiliation":[]},{"given":"F.","family":"Krief","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"SLN NSLP A Service Level Negotiation Signaling Protocol in the NSIS Environment","year":"2005","author":"mbarek auf","key":"19"},{"journal-title":"Open Implementation and Flexibility in Collaboration Toolkits","year":"1996","author":"dourish","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/32.824414"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/32.824414"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2002.1181414"},{"year":"0","key":"13"},{"year":"0","key":"14"},{"article-title":"A Policy Framework for Management of Distributed Systems","year":"2002","author":"damianou","key":"11"},{"journal-title":"Charter","year":"0","key":"12"},{"year":"0","key":"3"},{"key":"2","article-title":"Modelling and Analysing User Views of Telecommunications Services","author":"thomas","year":"1997","journal-title":"Feature Interactions in Telecommunication Networks IV"},{"volume":"31","journal-title":"Special Issue on Feature Interactions in Telecommunications Systems","year":"1993","key":"1"},{"journal-title":"Member IEEE","year":"0","author":"verma","key":"10"},{"key":"7","article-title":"Policy Definition and Classification: Aspects, Criteria and Examples","author":"weis","year":"1994","journal-title":"Proc 4th IFIP\/IEEE Workshop Distributed Systems Operations Management"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/49.257932"},{"key":"5","article-title":"Dynamic Conflict Detection in Potlcy-Based Management Systems","author":"dunlop","year":"2002","journal-title":"Enterprise Distributed Object Computing Conference (EDOC)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008730221445"},{"article-title":"Specifying and Implementing Security Policies Using LaSCO, the Language for Security Constraints on Objects","year":"2000","author":"hoagland","key":"9"},{"key":"8","article-title":"Cachet: Language Support for Customizable Caching Policies","author":"fritz barnes","year":"1999","journal-title":"Proc Fourth Int'l Web Caching Workshop (WCW '99)"}],"event":{"name":"2005 IEEE 16th International Symposium on Personal, Indoor and Mobile Radio Communications","location":"Berlin, Germany"},"container-title":["2005 IEEE 16th International Symposium on Personal, Indoor and Mobile Radio Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10989\/34628\/01651752.pdf?arnumber=1651752","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T13:04:27Z","timestamp":1489583067000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1651752\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/pimrc.2005.1651752","relation":{},"subject":[]}}