{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:58Z","timestamp":1750307578287,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T00:00:00Z","timestamp":1259020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,24]]},"DOI":"10.1145\/1655925.1656041","type":"proceedings-article","created":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T15:21:10Z","timestamp":1259076070000},"page":"643-648","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Architecting autonomic computing systems through Probabilistic Software Stability Model (PSSM)"],"prefix":"10.1145","author":[{"given":"E R","family":"Naganathan","sequence":"first","affiliation":[{"name":"Velammal Group of Institutions, Chennai, India"}]},{"given":"Xavier P","family":"Eugene","sequence":"additional","affiliation":[{"name":"Alagappa University, Karaikudi, India"}]}],"member":"320","published-online":{"date-parts":[[2009,11,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Ahmed Mahdy and Mohamed E. Fayad. \"A Software Stability Model Pattern\" found online at http:\/\/www.hillside.net\/plop\/plop2002\/final\/StabilityPatternPLoP02Correct.pdf  Ahmed Mahdy and Mohamed E. Fayad. \"A Software Stability Model Pattern\" found online at http:\/\/www.hillside.net\/plop\/plop2002\/final\/StabilityPatternPLoP02Correct.pdf"},{"key":"e_1_3_2_1_2_1","unstructured":"Mohamed Fayad \"Accomplishing Software Stability\" (Thinking Objectively) found online at http:\/\/www.engr.sjsu.edu\/fayad\/workshops\/iri03\/co12-fayad.pdf  Mohamed Fayad \"Accomplishing Software Stability\" (Thinking Objectively) found online at http:\/\/www.engr.sjsu.edu\/fayad\/workshops\/iri03\/co12-fayad.pdf"},{"key":"e_1_3_2_1_3_1","volume-title":"Third IEEE Conference - SSIRI, 8--10","author":"E. R","year":"2009","unstructured":"Naganathan, E. R , Eugene X. P,\" Software Stability Model (SSM) for Building Reliable Real Time Computing Systems\" , Third IEEE Conference - SSIRI, 8--10 July 2009 , Shanghai {In IEEE press}. Naganathan, E. R, Eugene X. P,\"Software Stability Model (SSM) for Building Reliable Real Time Computing Systems\", Third IEEE Conference - SSIRI, 8--10 July 2009, Shanghai {In IEEE press}."},{"key":"e_1_3_2_1_4_1","volume-title":"Downloaded on","author":"Mahdy Ahmed M","year":"2008","unstructured":"Ahmed M Mahdy , Haitham S Hamza , M E Fayad , Marshall Cline ,\" Identifying Domain Patterns using Software Stability\" , IEEE Digital Library , Downloaded on 31 Dec , 2008 found online at http:\/\/ieeexplore.ieee.org\/ie15\/9790\/30875\/01431430.pdf Ahmed M Mahdy, Haitham S Hamza, M E Fayad, Marshall Cline,\"Identifying Domain Patterns using Software Stability\", IEEE Digital Library, Downloaded on 31 Dec, 2008 found online at http:\/\/ieeexplore.ieee.org\/ie15\/9790\/30875\/01431430.pdf"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1598732.1598741"},{"volume-title":"Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC '04)","author":"Yan","key":"e_1_3_2_1_6_1","unstructured":"Yan Liu et al., \"Adaptive Control Software: Can we Guarantee Safety? \", Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC '04) DOI: http:\/\/ieeexplore.ieee.org\/ie15\/9304\/29573\/01342686.pdf?arnumber=1342686 Yan Liu et al., \"Adaptive Control Software: Can we Guarantee Safety?\", Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC '04) DOI: http:\/\/ieeexplore.ieee.org\/ie15\/9304\/29573\/01342686.pdf?arnumber=1342686"},{"key":"e_1_3_2_1_7_1","volume-title":"Downloaded on","author":"Mahdy Ahmed M","year":"2008","unstructured":"Ahmed M Mahdy , Haitham S Hamza , M E Fayad , Marshall Cline , \" Identifying Domain Patterns using Software Stability\" , IEEE Digital Library , Downloaded on 31 Dec , 2008 DOI: http:\/\/ieeexplore.ieee.org\/ie15\/9790\/30875\/01431430.pdf Ahmed M Mahdy, Haitham S Hamza, M E Fayad, Marshall Cline, \"Identifying Domain Patterns using Software Stability\", IEEE Digital Library, Downloaded on 31 Dec, 2008 DOI: http:\/\/ieeexplore.ieee.org\/ie15\/9790\/30875\/01431430.pdf"},{"key":"e_1_3_2_1_8_1","first-page":"101","volume":"2","author":"E. R","year":"2009","unstructured":"Naganathan. E. R , Eugene X. P, \" Designing Adaptive Reconfigurable Control (ARC) Based Real-Time transaction Processing Systems (RTTPS) Through Software Stability Model (SSM)\", Advances in Computational Sciences and Technology ISSN 0973--6107 Volume 2 Number 2 ( 2009 ) pp. 101 -- 116 ,\u00a9 Research India Publications, http:\/\/www.ripublication.com\/acst.htm Naganathan. E. R, Eugene X. P, \"Designing Adaptive Reconfigurable Control (ARC)Based Real-Time transaction Processing Systems (RTTPS) Through Software Stability Model (SSM)\", Advances in Computational Sciences and Technology ISSN 0973--6107 Volume 2 Number 2 (2009) pp. 101--116,\u00a9 Research India Publications, http:\/\/www.ripublication.com\/acst.htm","journal-title":"Number"},{"key":"e_1_3_2_1_9_1","first-page":"0","volume-title":"Autonomic Computing","author":"Murch R.","year":"2004","unstructured":"R. Murch . Autonomic Computing . In Prentice-Hall , pages 0 -- 20 ; 25--40, October 2004 . R. Murch. Autonomic Computing. In Prentice-Hall, pages 0--20; 25--40, October 2004."},{"key":"e_1_3_2_1_10_1","unstructured":"Mohammad Reza Nami Koen Bertels \"Survey of Autonomic Computing Systems\" found online at portal acm.org\/citation.cfm?id=1270794  Mohammad Reza Nami Koen Bertels \"Survey of Autonomic Computing Systems\" found online at portal acm.org\/citation.cfm?id=1270794"}],"event":{"name":"ICIS '09: The 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","sponsor":["AICIT","ETRI","KISTI"],"location":"Seoul Korea","acronym":"ICIS '09"},"container-title":["Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1656041","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1655925.1656041","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:12Z","timestamp":1750250472000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1656041"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,24]]},"references-count":10,"alternative-id":["10.1145\/1655925.1656041","10.1145\/1655925"],"URL":"https:\/\/doi.org\/10.1145\/1655925.1656041","relation":{},"subject":[],"published":{"date-parts":[[2009,11,24]]},"assertion":[{"value":"2009-11-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}