{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:10:45Z","timestamp":1755997845482},"reference-count":19,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Commun."],"published-print":{"date-parts":[[2021,7,1]]},"DOI":"10.1587\/transcom.2020cqp0009","type":"journal-article","created":{"date-parts":[[2021,2,3]],"date-time":"2021-02-03T22:15:24Z","timestamp":1612390524000},"page":"791-804","source":"Crossref","is-referenced-by-count":7,"title":["An Intent-Based System Configuration Design for IT\/NW Services with Functional and Quantitative Constraints"],"prefix":"10.23919","volume":"E104.B","author":[{"given":"Takuya","family":"KUWAHARA","sequence":"first","affiliation":[{"name":"NEC Corporation"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Takayuki","family":"KURODA","sequence":"additional","affiliation":[{"name":"NEC Corporation"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Takao","family":"OSAKI","sequence":"additional","affiliation":[{"name":"NEC Corporation"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kozo","family":"SATODA","sequence":"additional","affiliation":[{"name":"NEC Corporation"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"1","unstructured":"[1] Kustomize-kubernetes native configuration management. https:\/\/kustomize.io\/"},{"key":"2","unstructured":"[2] Network orchestration &amp; edge networking \u2014 cloudify. https:\/\/cloudify.co\/"},{"key":"3","unstructured":"[3] Openstack docs: Heat orchestration template (HOT) guide. https:\/\/docs.openstack.org\/heat\/rocky\/template_guide\/hot_guide.html"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] D. Ardagna, E. Di Nitto, P. Mohagheghi, S. Mosser, C. Ballagny, F. D&apos;Andria, G. Casale, P. Matthews, C. Nechifor, D. Petcu, A. Gericke, and C. Sheridan, \u201cMODAClouds: A model-driven approach for the design and execution of applications on multiple clouds,\u201d 2012 4th International Workshop on Modeling in Software Engineering (MISE), pages 50-56, June 2012. 10.1109\/mise.2012.6226014","DOI":"10.1109\/MISE.2012.6226014"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] L. Baresi, R. Heckel, S. Th\u00f6ne, and D. Varro, \u201cStyle-based modeling and refinement of service-oriented architectures,\u201d Softw. Syst. Model., vol.5, pp.187-207, 2006. 10.1007\/s10270-006-0001-4","DOI":"10.1007\/s10270-006-0001-4"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] C. Barrett, C.L. Conway, M. Deters, L. Hadarean, D. Jovanovi\u0107, T. King, A. Reynolds, and C. Tinelli, \u201cCVC4,\u201d G. Gopalakrishnan and S. Qadeer, eds., Computer Aided Verification, pp.171-177, Springer Berlin Heidelberg, Berlin, Heidelberg, 2011. 10.1007\/978-3-642-22110-1_14","DOI":"10.1007\/978-3-642-22110-1_14"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] G.E. Collins, \u201cQuantifier elimination for real closed fields by cylindrical algebraic decompostion,\u201d H. Brakhage, ed., Automata Theory and Formal Languages, pp.134-183, Springer Berlin Heidelberg, Berlin, Heidelberg, 1975. 10.1007\/3-540-07407-4_17","DOI":"10.1007\/3-540-07407-4_17"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] L. de Moura and N. Bj\u00f8rner, \u201cZ3: An efficient smt solver,\u201d Tools and Algorithms for the Construction and Analysis of Systems, LNCS, vol.4963, pp.337-340, April 2008. 10.1007\/978-3-540-78800-3_24","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] B. Dutertre, \u201cYices 2.2,\u201d A. Biere and Ro. Bloem, eds., Computer Aided Verification, pp.737-744, Springer International Publishing, Cham, 2014. 10.1007\/978-3-319-08867-9_49","DOI":"10.1007\/978-3-319-08867-9_49"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] \u00c1. Heged\u00fcs, \u00c1. Horv\u00e1th, I. R\u00e1th, and D. Varr\u00f3, \u201cA model-driven framework for guided design space exploration,\u201d 2011 26th IEEE\/ACM International Conference on Automated Software Engineering (ASE 2011), pp.173-182, 2011. 10.1109\/ase.2011.6100051","DOI":"10.1109\/ASE.2011.6100051"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] J.B. Kam and J.D. Ullman, \u201cGlobal data flow analysis and iterative algorithms,\u201d J. ACM, vol.23, no.1, pp.158-171, 1976. 10.1145\/321921.321938","DOI":"10.1145\/321921.321938"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] T. Kuroda, T. Kuwahara, T. Maruyama, K. Satoda, H. Shimonishi, T. Osaki, and K. Matsuda, \u201cWeaver: A novel configuration designer for IT\/NW services in heterogeneous environments,\u201d 2019 IEEE Global Communications Conference (GLOBECOM), pp.1-6, 2019. 10.1109\/globecom38437.2019.9014133","DOI":"10.1109\/GLOBECOM38437.2019.9014133"},{"key":"13","doi-asserted-by":"publisher","unstructured":"[13] L. Zeng, B. Benatallah, A.H.H. Ngu, M. Dumas, J. Kalagnanam, and H. Chang, \u201cQoS-aware middleware for web services composition,\u201d IEEE Trans. Softw. Eng., vol.30, no.5, pp.311-327, 2004. 10.1109\/tse.2004.11","DOI":"10.1109\/TSE.2004.11"},{"key":"14","unstructured":"[14] A.M. Maia, Y. Ghamri-Doudane, D. Vieira, and M.F. de Castro, \u201cOptimized placement of scalable IoT services in edge computing,\u201d 2019 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM), pp.189-197, 2019."},{"key":"15","doi-asserted-by":"publisher","unstructured":"[15] D. Menasc\u00e9, H. Gomaa, S. Malek, and J. Sousa, \u201cSASSY: A framework for self-architecting service-oriented systems,\u201d IEEE Softw., vol.28, no.6, pp.78-85, Jan. 2012. 10.1109\/ms.2011.22","DOI":"10.1109\/MS.2011.22"},{"key":"16","unstructured":"[16] A. Rensink, I. Boneva, H. Kastenberg, and T. Staijen, \u201cUser manual for the GROOVE tool set,\u201d https:\/\/groove.ewi.utwente.nl\/wp-content\/uploads\/usermanual1.pdf, 2009."},{"key":"17","unstructured":"[17] M. Rutkowski, L. Boutier, and C. Lauwers, \u201cTOSCA simple profile in YAML version 1.2,\u201d https:\/\/docs.oasis-open.org\/tosca\/TOSCA-Simple-Profile-YAML\/v1.2\/TOSCA-Simple-Profile-YAML-v1.2.html, 2019."},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] G. Sallam and B. Ji, \u201cJoint placement and allocation of virtual network functions with budget and capacity constraints,\u201d IEEE INFOCOM 2019-IEEE Conference on Computer Communications, pp.523-531, 2019. 10.1109\/infocom.2019.8737400","DOI":"10.1109\/INFOCOM.2019.8737400"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] K. Ueda, \u201cLMNtal as a hierarchical logic programming language,\u201d Theor. Comput. Sci., vol.410, no.46, pp.4784-4800, Nov. 2009. 10.1016\/j.tcs.2009.07.043","DOI":"10.1016\/j.tcs.2009.07.043"}],"container-title":["IEICE Transactions on Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E104.B\/7\/E104.B_2020CQP0009\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T14:58:55Z","timestamp":1704898735000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E104.B\/7\/E104.B_2020CQP0009\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,1]]},"references-count":19,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2021]]}},"URL":"https:\/\/doi.org\/10.1587\/transcom.2020cqp0009","relation":{},"ISSN":["0916-8516","1745-1345"],"issn-type":[{"value":"0916-8516","type":"print"},{"value":"1745-1345","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,1]]},"article-number":"2020CQP0009"}}