{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:18:43Z","timestamp":1759133923914},"reference-count":26,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2006,1]]},"DOI":"10.1109\/tnsm.2006.4798303","type":"journal-article","created":{"date-parts":[[2009,3,9]],"date-time":"2009-03-09T22:57:20Z","timestamp":1236639440000},"page":"13-21","source":"Crossref","is-referenced-by-count":11,"title":["On the stability of adaptive Service Level Agreements"],"prefix":"10.1109","volume":"3","author":[{"given":"Kyrre","family":"Begnum","sequence":"first","affiliation":[]},{"given":"Mark","family":"Burgess","sequence":"additional","affiliation":[]},{"given":"Tore M.","family":"Jonassen","sequence":"additional","affiliation":[]},{"given":"Siri","family":"Fagernes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","year":"0"},{"key":"ref11","first-page":"42","article-title":"Optimizing quality of service using fuzzy control","author":"diao","year":"2002","journal-title":"IFIP\/IEEE 13th International Workshop on Distributed Systems Operations and Management (DSOM 2002)"},{"key":"ref12","first-page":"283","article-title":"Computer immunology","author":"burgess","year":"1998","journal-title":"Proceedings of the Twelth Systems Administration Conference (LISA XII) (USENIX Association Berkeley"},{"key":"ref13","first-page":"169","article-title":"Two dimensional time-series for anomaly detection and regulation in adaptive systems","volume":"lncs 2506","author":"burgess","year":"2002","journal-title":"IFIP\/IEEE 13th International Workshop on Distributed Systems Operations and Management (DSOM 2002)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35674-7_23"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/11568285_9","article-title":"An approach to policy based on autonomy and voluntary cooperation","volume":"3775","author":"burgess","year":"2005","journal-title":"Lecture Notes on Computer Science"},{"key":"ref16","year":"1986","journal-title":"Chaos"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/047166880X"},{"key":"ref18","author":"suneel","year":"2005","journal-title":"Dynamical systems as logic gates"},{"key":"ref19","author":"h0yland","year":"1994","journal-title":"System Reliability Theory Models and Statistical Methods"},{"key":"ref4","first-page":"82","article-title":"Quality aspects in it service management","author":"rodosek","year":"2002","journal-title":"14th IFIP\/IEEE International Workshop on Distributed Systems Operations and Management (DSOM)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2003.08.001"},{"key":"ref6","first-page":"28","article-title":"Automated SLA monitoring for web services","author":"sahai","year":"2002","journal-title":"IFIP\/IEEE 13th International Workshop on Distributed Systems Operations and Management (DSOM 2002)"},{"key":"ref5","first-page":"4","article-title":"Modeling of service-level agreements for composed services","author":"daly","year":"2002","journal-title":"IFIP\/IEEE 13th International Workshop on Distributed Systems Operations and Management (DSOM 2002)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2003.1194211"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2003.1194182"},{"key":"ref2","article-title":"Policy based SLA management in enterprise networks","author":"verma","year":"2001","journal-title":"Proc Policy Workshop 2001"},{"key":"ref9","year":"0"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02283186"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/047086107X"},{"key":"ref22","author":"axelrod","year":"1990","journal-title":"The Evolution of Co-Operation"},{"key":"ref21","author":"axelrod","year":"1997","journal-title":"Princeton Studies in Complexity"},{"key":"ref24","author":"isaacs","year":"1965","journal-title":"Differential Games A Mathematical Theory With Applications to Warfare and Pursuit Control and Optimization"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.4337\/9781781956298","author":"nash","year":"1996","journal-title":"Essays on Game Theory"},{"key":"ref26","author":"jonassen","year":"2002","journal-title":"On the concept of hyperbolicity the yerevan and japan talks"},{"key":"ref25","author":"arrowsmith","year":"1990","journal-title":"An Introduction to dynamical Systems"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4275028\/4798301\/04798303.pdf?arnumber=4798303","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,11]],"date-time":"2024-03-11T07:26:29Z","timestamp":1710141989000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4798303\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,1]]},"references-count":26,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2006.4798303","relation":{},"ISSN":["1932-4537"],"issn-type":[{"value":"1932-4537","type":"print"}],"subject":[],"published":{"date-parts":[[2006,1]]}}}