{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:18:15Z","timestamp":1725556695218},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/inm.2005.1440772","type":"proceedings-article","created":{"date-parts":[[2005,6,15]],"date-time":"2005-06-15T15:51:13Z","timestamp":1118850673000},"page":"75-88","source":"Crossref","is-referenced-by-count":2,"title":["Health monitoring and control for application server environments"],"prefix":"10.1109","author":[{"given":"N.","family":"Anerousis","sequence":"first","affiliation":[]},{"given":"A.","family":"Black","sequence":"additional","affiliation":[]},{"given":"S.","family":"Hanson","sequence":"additional","affiliation":[]},{"given":"L.","family":"Mummert","sequence":"additional","affiliation":[]},{"given":"G.","family":"Pacifici","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Java Management Extensions (JMX)","year":"0","key":"15"},{"journal-title":"SOAP Version 1 2","year":"0","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/4236.939450"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-006-7562-4"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/2.722290"},{"year":"0","author":"das","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2004.1317649"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.1997.623361"},{"key":"1","article-title":"Evaluating management decisions via delegation","author":"goldszmidt","year":"1993","journal-title":"The Third International Symposium on Integrated Network Management"},{"year":"2003","author":"harper","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1995.466961"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1998.730892"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1109\/CMPASS.1997.613248","article-title":"On the analysis of software rejuvenation policies","author":"garg","year":"1997","journal-title":"Proc 11th Ann Conf Computer Assurance"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2001.918054"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.2001.990072"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/IPDS.1998.707704"}],"event":{"name":"2005 9th IFIP\/IEEE International Symposium on Integrated Network Management, 2005. IM 2005.","location":"Nice, France"},"container-title":["2005 9th IFIP\/IEEE International Symposium on Integrated Network Management, 2005. IM 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9839\/31017\/01440772.pdf?arnumber=1440772","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T16:15:50Z","timestamp":1497629750000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1440772\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/inm.2005.1440772","relation":{},"subject":[]}}