{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:03:53Z","timestamp":1766066633165,"version":"3.37.3"},"reference-count":70,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T00:00:00Z","timestamp":1496275200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61672152","61232007","61532013"],"award-info":[{"award-number":["61672152","61232007","61532013"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Novel Software Technology and Industrialization and Wireless Communications Technology"},{"DOI":"10.13039\/501100000923","name":"Australian Research Council\u2019s","doi-asserted-by":"publisher","award":["LP120200305"],"award-info":[{"award-number":["LP120200305"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2017,6,1]]},"DOI":"10.1109\/tse.2016.2615615","type":"journal-article","created":{"date-parts":[[2016,10,6]],"date-time":"2016-10-06T14:25:44Z","timestamp":1475763944000},"page":"556-579","source":"Crossref","is-referenced-by-count":38,"title":["Online Reliability Prediction via Motifs-Based Dynamic Bayesian Networks for Service-Oriented Systems"],"prefix":"10.1109","volume":"43","author":[{"given":"Hongbing","family":"Wang","sequence":"first","affiliation":[]},{"given":"Lei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Zibin","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Athman","family":"Bouguettaya","sequence":"additional","affiliation":[]},{"given":"Michael R.","family":"Lyu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2011","author":"han","journal-title":"Data Mining Concepts and Techniques","key":"ref70"},{"key":"ref39","first-page":"1","article-title":"Bayesian approaches to failure prediction for disk drives","author":"hamerly","year":"0","journal-title":"Proc 18th Int Conf Mach Learn"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/TR.2007.909764"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/24.55879"},{"key":"ref32","first-page":"1","article-title":"Software engineering for self-adaptive systems: A second\n research roadmap","author":"de lemos","year":"2013","journal-title":"Software Engineering for Self-Adaptive Systems II"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1007\/978-3-642-02161-9_1"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/MC.2004.48"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/INM.2007.374780"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/ISSRE.1999.809313"},{"key":"ref35","first-page":"425","article-title":"BlueGene\/L failure analysis and prediction models","author":"liang","year":"0","journal-title":"Proc Int Conf Depend Syst Netw"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/TR.2002.804733"},{"year":"2012","author":"murphy","journal-title":"Machine Learning A Probabilistic Perspective","key":"ref60"},{"doi-asserted-by":"publisher","key":"ref62","DOI":"10.1016\/j.jss.2011.01.048"},{"doi-asserted-by":"publisher","key":"ref61","DOI":"10.1109\/TSE.2011.94"},{"year":"1996","author":"lyu","journal-title":"Handbook of Software Reliability Engineering","key":"ref63"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1007\/s11761-012-0109-z"},{"doi-asserted-by":"publisher","key":"ref64","DOI":"10.1109\/TPDS.2010.92"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1016\/j.jss.2013.03.045"},{"key":"ref65","first-page":"824","article-title":"Network motifs: Simple building blocks of complex networks","volume":"298","author":"milo","year":"2002","journal-title":"Sci Signal"},{"doi-asserted-by":"publisher","key":"ref66","DOI":"10.1039\/c2mb25346a"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/TSE.2012.84"},{"doi-asserted-by":"publisher","key":"ref67","DOI":"10.1137\/1.9781611972795.41"},{"doi-asserted-by":"publisher","key":"ref68","DOI":"10.1109\/RTTAS.1997.601351"},{"doi-asserted-by":"publisher","key":"ref69","DOI":"10.1002\/qre.392"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1287\/mnsc.17.11.661"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1504\/IJSSE.2008.018129"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/ICWS.2013.15"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/TSC.2011.59"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1007\/s11280-012-0186-0"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1016\/j.websem.2004.03.001"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/2491411.2491424"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/ICWS.2012.37"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1145\/2351676.2351695"},{"key":"ref50","first-page":"4062","article-title":"Application cluster service scheme for near-zero-downtime services","author":"cheng","year":"0","journal-title":"Proc IEEE Int Conf Robot Autom"},{"key":"ref51","first-page":"1","article-title":"Using fractal analysis to model software aging","author":"crowell","year":"2002"},{"year":"2009","author":"koller","journal-title":"Probabilistic Graphical Models Principles and Techniques","key":"ref59"},{"doi-asserted-by":"publisher","key":"ref58","DOI":"10.1017\/CBO9780511790492"},{"year":"2006","author":"salfner","article-title":"Modeling event-driven time series with generalized hidden\n semi-Markov models","key":"ref57"},{"doi-asserted-by":"publisher","key":"ref56","DOI":"10.1109\/ISSRE.2003.1251049"},{"doi-asserted-by":"publisher","key":"ref55","DOI":"10.1147\/sj.413.0461"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.1109\/NOMS.1996.539622"},{"year":"2003","author":"lunze","journal-title":"Automatisierungstechnik","key":"ref53"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1109\/DSN.2003.1209987"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/2430545.2430548"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.4304\/jcm.7.1.52-61"},{"key":"ref40","first-page":"783","article-title":"Machine learning methods for predicting failures in hard drives: A multiple-instance application","volume":"6","author":"murray","year":"0","journal-title":"J Mach Learning Res"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/1806799.1806809"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/TSC.2010.16"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.4018\/jwsr.2010100102"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1007\/978-3-642-45005-1_30"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/TSE.2010.92"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TSE.2011.68"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1016\/j.jss.2012.11.037"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/ICWS.2012.90"},{"year":"2014","article-title":"Next Generation Air Transportation System (NextGen)","key":"ref4"},{"year":"2011","author":"jamshidi","journal-title":"System of Systems Engineering Innovations for the Twenty-First Century","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/MIC.2008.24"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/JSYST.2009.2022572"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/1670679.1670680"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/SYSOSE.2007.4304313"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1090\/fic\/028\/01"},{"year":"1991","journal-title":"IEEE Standard Glossary of Software Engineering Terminology","first-page":"729","key":"ref9"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1145\/306225.306237"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1109\/TR.2002.802886"},{"year":"2004","author":"korbicz","journal-title":"Fault Diagnosis Models Artificial Intelligence Applications","key":"ref48"},{"year":"2004","author":"chen","article-title":"Path-based failure and evolution management","key":"ref47"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1109\/TNN.2005.853411"},{"year":"2003","author":"turnbull","article-title":"Failure prediction in hardware systems","key":"ref41"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1109\/DSN.2002.1029005"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1109\/SRDS.2006.24"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/7946233\/07585067.pdf?arnumber=7585067","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:41:13Z","timestamp":1641987673000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7585067\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,1]]},"references-count":70,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tse.2016.2615615","relation":{},"ISSN":["0098-5589","1939-3520"],"issn-type":[{"type":"print","value":"0098-5589"},{"type":"electronic","value":"1939-3520"}],"subject":[],"published":{"date-parts":[[2017,6,1]]}}}