{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T02:11:29Z","timestamp":1725675089584},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,7]]},"DOI":"10.1109\/compsac.2007.15","type":"proceedings-article","created":{"date-parts":[[2007,8,22]],"date-time":"2007-08-22T20:25:06Z","timestamp":1187814306000},"page":"237-248","source":"Crossref","is-referenced-by-count":3,"title":["A Control-Theoretic Approach to QoS Adaptation in Data Stream Management Systems Design"],"prefix":"10.1109","author":[{"given":"Hai","family":"Hu","sequence":"first","affiliation":[]},{"given":"Chang-Hai","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Kai-Yuan","family":"Cai","sequence":"additional","affiliation":[]},{"given":"W. Eric","family":"Wong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-8714-3","author":"hernandez-lerma","year":"1989","journal-title":"Adaptive Markov Control Processes"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/32.879811"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1360\/02yf0308"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2003.1319102"},{"key":"12","first-page":"452","article-title":"Synthesizing Distributed Controller for Safe Operation of Connected Spaces","author":"sridharan","year":"2003","journal-title":"Proc 1st IEEE Conf Pervasive Computing Communications"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972757.31"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2004.1320010"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012722442-8\/50035-5"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1199072"},{"key":"7","first-page":"240","article-title":"Towards Research on Software Cybernetics","author":"cai","year":"2002","journal-title":"Proc 5th IEEE Int Symp High Assurance Systems Engineering"},{"year":"0","key":"6"},{"key":"5","first-page":"787","article-title":"Load Shedding in Stream Databases: A Control-Based Approach","author":"tu","year":"2006","journal-title":"Proceedings of the 32nd international conference on Very large data bases"},{"key":"4","first-page":"277","article-title":"The Design of the Borealis Stream Processing Engine","author":"abadi","year":"2005","journal-title":"Proc Second Biennial Conf Innovative Data Systems Research"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027800"},{"key":"8","first-page":"77","article-title":"An Overview of Software Cybernetics","author":"cai","year":"2004","journal-title":"Proceedings of the 11th International Workshop on Software Technology and Engineering Practice 2003"}],"event":{"name":"31st Annual International Computer Software and Applications Conference - Vol. 2 - (COMPSAC 2007)","start":{"date-parts":[[2007,7,24]]},"location":"Beijing, China","end":{"date-parts":[[2007,7,27]]}},"container-title":["31st Annual International Computer Software and Applications Conference - Vol. 2 - (COMPSAC 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4290962\/4291085\/04291131.pdf?arnumber=4291131","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,28]],"date-time":"2022-01-28T22:26:58Z","timestamp":1643408818000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4291131\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/compsac.2007.15","relation":{},"ISSN":["0730-3157"],"issn-type":[{"type":"print","value":"0730-3157"}],"subject":[],"published":{"date-parts":[[2007,7]]}}}