{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:29:03Z","timestamp":1750307343578,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,5,23]],"date-time":"2011-05-23T00:00:00Z","timestamp":1306108800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,5,23]]},"DOI":"10.1145\/1988008.1988019","type":"proceedings-article","created":{"date-parts":[[2011,5,24]],"date-time":"2011-05-24T13:04:30Z","timestamp":1306242270000},"page":"70-79","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Characterizing problems for realizing policies in self-adaptive and self-managing systems"],"prefix":"10.1145","author":[{"given":"Sowmya","family":"Balasubramanian","sequence":"first","affiliation":[{"name":"University of Victoria, Victoria, BC, Canada"}]},{"given":"Ron","family":"Desmarais","sequence":"additional","affiliation":[{"name":"University of Victoria, Victoria, BC, Canada"}]},{"given":"Hausi A.","family":"M\u00fcller","sequence":"additional","affiliation":[{"name":"University of Victoria, Victoria, BC, Canada"}]},{"given":"Ulrike","family":"Stege","sequence":"additional","affiliation":[{"name":"University of Victoria, Victoria, BC, Canada"}]},{"given":"S.","family":"Venkatesh","sequence":"additional","affiliation":[{"name":"University of Victoria, Victoria, BC, Canada"}]}],"member":"320","published-online":{"date-parts":[[2011,5,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1770560.1770567"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAS.2009.58"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2010.5488472"},{"key":"e_1_3_2_1_4_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-16599-3","volume-title":"The Smart Internet - Current Research and Future Applications","author":"Chignell M. H.","year":"2010","unstructured":"M. H. Chignell , J. R. Cordy , J. Ng , and Y. Yesha . The Smart Internet - Current Research and Future Applications , volume 6400 of Lecture Notes in Computer Science . Springer , 2010 . M. H. Chignell, J. R. Cordy, J. Ng, and Y. Yesha. The Smart Internet - Current Research and Future Applications, volume 6400 of Lecture Notes in Computer Science. Springer, 2010."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1186778.1186782"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2464827"},{"issue":"1","key":"e_1_3_2_1_7_1","first-page":"27","article-title":"Matroids and the greedy algorithm","volume":"1","author":"Edmonds J.","year":"1971","unstructured":"J. Edmonds . Matroids and the greedy algorithm . Mathematical Programming Studies , 1 ( 1 ): 27 -- 36 , 1971 . J. Edmonds. Matroids and the greedy algorithm. Mathematical Programming Studies, 1(1):27--36, 1971.","journal-title":"Mathematical Programming Studies"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0121195"},{"key":"e_1_3_2_1_9_1","volume-title":"Computers and Intractability: A Guide to the Theory of NP-completeness","author":"Garey M.","year":"1979","unstructured":"M. Garey and D. Johnson . Computers and Intractability: A Guide to the Theory of NP-completeness . W. H. Freeman , 1979 . M. Garey and D. Johnson. Computers and Intractability: A Guide to the Theory of NP-completeness. W. H. Freeman, 1979."},{"key":"e_1_3_2_1_10_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-02716-1","volume-title":"Engineering Self-Adaptive and Self-Managing Systems","author":"Giese H.","year":"2009","unstructured":"H. Giese , Y. Brun , J. Serugendo , C. Gacek , H. Kienle , H. M\u00fcller , M. Pezz\u00e8 , and M. Shaw . Engineering Self-Adaptive and Self-Managing Systems , volume 5527 of Lecture Notes in Computer Science . Springer , 2009 . H. Giese, Y. Brun, J. Serugendo, C. Gacek, H. Kienle, H. M\u00fcller, M. Pezz\u00e8, and M. Shaw. Engineering Self-Adaptive and Self-Managing Systems, volume 5527 of Lecture Notes in Computer Science. Springer, 2009."},{"key":"e_1_3_2_1_11_1","volume-title":"A survey on cloud computing. Technical report","author":"Goyal A.","year":"2009","unstructured":"A. Goyal and S. Dadizadeh . A survey on cloud computing. Technical report , 2009 . A. Goyal and S. Dadizadeh. A survey on cloud computing. Technical report, 2009."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/975344"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1380584.1380585"},{"key":"e_1_3_2_1_14_1","volume-title":"Technical report","author":"IBM.","year":"2006","unstructured":"IBM. An architectural blueprint for autonomic computing. Technical report , 2006 . IBM. An architectural blueprint for autonomic computing. Technical report, 2006."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2007.2"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/998684.1006912"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2010.109"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/646962.712119"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/11841036_48"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780198566076.001.0001","volume-title":"Invitation to Fixed Parameter Algorithms","author":"Niedermeier R.","year":"2006","unstructured":"R. Niedermeier . Invitation to Fixed Parameter Algorithms . Oxford University Press , 2006 . R. Niedermeier. Invitation to Fixed Parameter Algorithms. Oxford University Press, 2006."},{"key":"e_1_3_2_1_22_1","volume-title":"Oxford University Press","author":"Oxley J. G.","year":"1992","unstructured":"J. G. Oxley . Matroid Theory . Oxford University Press , 1992 . J. G. Oxley. Matroid Theory. Oxford University Press, 1992."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/863632.883509"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/827269.828990"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/827270.829012"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/IA.2009.4927511"},{"key":"e_1_3_2_1_27_1","volume-title":"Artificial Intelligence: A Modern Approach","author":"Russell S.","year":"2010","unstructured":"S. Russell and P. Norvig . Artificial Intelligence: A Modern Approach , 3 rd Edition. Prentice Hall , 2010 . S. Russell and P. Norvig. Artificial Intelligence: A Modern Approach, 3rd Edition. Prentice Hall, 2010.","edition":"3"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1516533.1516538"},{"key":"e_1_3_2_1_29_1","volume-title":"Combinatorial Optimization","author":"Schrijver A.","year":"2003","unstructured":"A. Schrijver . Combinatorial Optimization . Springer-Verlag , 2003 . A. Schrijver. Combinatorial Optimization. Springer-Verlag, 2003."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/6294.819933"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings 1st International Workshop on Privacy in Location-Based Applications (PiLBA)","volume":"397","author":"Solanas A.","year":"2008","unstructured":"A. Solanas , J. D. Ferrer , and A. M. Ballest . Location privacy in location-based services: Beyond TTP-based schemes . In Proceedings 1st International Workshop on Privacy in Location-Based Applications (PiLBA) , volume 397 , 2008 . A. Solanas, J. D. Ferrer, and A. M. Ballest. Location privacy in location-based services: Beyond TTP-based schemes. In Proceedings 1st International Workshop on Privacy in Location-Based Applications (PiLBA), volume 397, 2008."},{"key":"e_1_3_2_1_32_1","unstructured":"V. Vazirani. Approximation Algorithms. Springer-Verlag 2001.   V. Vazirani. Approximation Algorithms. Springer-Verlag 2001."},{"key":"e_1_3_2_1_33_1","first-page":"820","volume-title":"Proceedings 10th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA)","author":"Woeginger G. J.","year":"1999","unstructured":"G. J. Woeginger . When does a dynamic programming formulation guarantee the existence of an FPTAS ? In Proceedings 10th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA) , pages 820 -- 829 , 1999 . G. J. Woeginger. When does a dynamic programming formulation guarantee the existence of an FPTAS? In Proceedings 10th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 820--829, 1999."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/502152.502155"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1035167.1035193"}],"event":{"name":"ICSE11: International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Waikiki, Honolulu HI USA","acronym":"ICSE11"},"container-title":["Proceedings of the 6th International Symposium on Software Engineering for Adaptive and Self-Managing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1988008.1988019","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1988008.1988019","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:06:25Z","timestamp":1750244785000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1988008.1988019"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5,23]]},"references-count":35,"alternative-id":["10.1145\/1988008.1988019","10.1145\/1988008"],"URL":"https:\/\/doi.org\/10.1145\/1988008.1988019","relation":{},"subject":[],"published":{"date-parts":[[2011,5,23]]},"assertion":[{"value":"2011-05-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}