{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:44:40Z","timestamp":1729619080274,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1109\/re.2011.6051650","type":"proceedings-article","created":{"date-parts":[[2011,10,21]],"date-time":"2011-10-21T15:05:14Z","timestamp":1319209514000},"page":"219-228","source":"Crossref","is-referenced-by-count":13,"title":["Are your sites down? Requirements-driven self-tuning for the survivability of Web systems"],"prefix":"10.1109","author":[{"given":"Bihuan","family":"Chen","sequence":"first","affiliation":[]},{"given":"Xin","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Yijun","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Wenyun","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/501158.501186"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/4236.807008"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MS.2006.71","article-title":"E-service design using i and e3 value modeling","volume":"23","author":"gordijn","year":"2006","journal-title":"IEEE Softw"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.25"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963205"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/IWQOS.2004.1309356"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242698"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/638750.638776"},{"key":"ref12","first-page":"114","article-title":"Value-based requirements engineering: exploring innovative e-commerce ideas","volume":"8","author":"gordijn","year":"2002","journal-title":"Requir Eng"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.24"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.26"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511805653"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/spe.767"},{"key":"ref17","article-title":"Rainbow: cost-effective software architecture-based self-adaptation","author":"cheng","year":"2008","journal-title":"PhD thesis"},{"journal-title":"Feedback Control of Dynamic Systems Upper Saddle River","year":"2006","author":"franklin","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68123-6_1"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.21"},{"key":"ref4","article-title":"ATAM: Method for architecture evaluation","author":"kazman","year":"2000","journal-title":"Technical Report"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2009.34"},{"key":"ref3","first-page":"51","article-title":"Achieving critical system survivability through software architectures","author":"knight","year":"3069","journal-title":"Architecting Dependable Systems II LNCS"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1380584.1380585"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2009.36"},{"journal-title":"Technical Report","article-title":"An architectural blueprint for autonomic computing","year":"2003","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.22"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595718"},{"article-title":"Amazon com experiences hours-Long outage","year":"2010","author":"mccullagh","key":"ref2"},{"key":"ref9","first-page":"363","article-title":"Reverse engineering goal models from legacy code","author":"yu","year":"2005"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/52.991329"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-COMPANION.2009.5071063"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2007.21"},{"key":"ref21","first-page":"1159","article-title":"Software self-reconfiguration: a BDI-based approach","author":"dalpiaz","year":"2009","journal-title":"AAMAS"},{"key":"ref24","first-page":"234","article-title":"Dealing with security requirements during the development of information system","author":"chung","year":"1993","journal-title":"CAiSE"},{"key":"ref23","first-page":"310","article-title":"Generation of self-optimizing wireless network applications","author":"sadjadi","year":"2004","journal-title":"ICAC"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1029894.1029905"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39733-5_1"}],"event":{"name":"2011 IEEE 19th International Requirements Engineering Conference (RE)","start":{"date-parts":[[2011,8,29]]},"location":"Trento, Italy","end":{"date-parts":[[2011,9,2]]}},"container-title":["2011 IEEE 19th International Requirements Engineering Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6036256\/6051621\/06051650.pdf?arnumber=6051650","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T08:26:05Z","timestamp":1497947165000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6051650\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/re.2011.6051650","relation":{},"subject":[],"published":{"date-parts":[[2011,8]]}}}