{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T13:14:34Z","timestamp":1771938874571,"version":"3.50.1"},"edition-number":"1","reference-count":49,"publisher":"Wiley","isbn-type":[{"value":"9780471383932","type":"print"},{"value":"9780470050118","type":"electronic"}],"license":[{"start":{"date-parts":[[2007,12,14]],"date-time":"2007-12-14T00:00:00Z","timestamp":1197590400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Fault tolerance is the survival attribute of a system or component to continue operating as required despite the manifestation of hardware or software faults. Fault\u2010tolerant software delivers continuous service complying with the relevant specification in the presence of faults typically by employing either single\u2010version software techniques or multiple\u2010version software techniques. We address four key perspectives for fault\u2010tolerant software: historical background, techniques, modeling schemes, and applications.<\/jats:p>","DOI":"10.1002\/9780470050118.ecse154","type":"other","created":{"date-parts":[[2007,12,6]],"date-time":"2007-12-06T17:49:24Z","timestamp":1196963364000},"source":"Crossref","is-referenced-by-count":3,"title":["Fault\u2010Tolerant Software"],"prefix":"10.1002","author":[{"given":"Michael R.","family":"Lyu","sequence":"first","affiliation":[]},{"given":"Xia","family":"Cai","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2007,12,14]]},"reference":[{"key":"e_1_2_8_2_1_1","volume-title":"IEEE Standard Computer Dictionary: A Compilation of IEEE Standard Computer Glossaries","year":"1990"},{"key":"e_1_2_8_2_2_1","volume-title":"Software Fault Tolerance","author":"Lyu M. R.","year":"1995"},{"key":"e_1_2_8_2_3_1","volume-title":"Software Fault Tolerance Techniques and Implementation","author":"Pullum L. L.","year":"2001"},{"key":"e_1_2_8_2_4_1","first-page":"81","volume-title":"Software Fault Tolerance","author":"Cristian F.","year":"1995"},{"key":"e_1_2_8_2_5_1","first-page":"167","volume-title":"Software Fault Tolerance","author":"Nicola V. F.","year":"1995"},{"key":"e_1_2_8_2_6_1","first-page":"1","volume-title":"Software Fault Tolerance","author":"Randell B.","year":"1995"},{"key":"e_1_2_8_2_7_1","unstructured":"A.AvizienisandL.Chen On the implementation of N\u2010version programming for software fault tolerance during execution Proc. of the Computer Software and Application Conference (COMPSAC77) Chicago Illinois:1977 pp.149\u2013155."},{"key":"e_1_2_8_2_8_1","doi-asserted-by":"crossref","unstructured":"A.Avizienis Dependable computing depends on structured fault tolerance Proc. of the 1995 6th International Symposium on Software Reliability Engineering Toulouse France 1995 pp.158\u2013168.","DOI":"10.1109\/ISSRE.1995.497654"},{"key":"e_1_2_8_2_9_1","first-page":"47","volume-title":"Software Fault Tolerance","author":"Laprie J. C.","year":"1995"},{"key":"e_1_2_8_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1975.6312842"},{"key":"e_1_2_8_2_11_1","first-page":"27","volume-title":"Handbook of Software Reliaiblity Engineering","author":"Laprie J. C.","year":"1996"},{"key":"e_1_2_8_2_12_1","first-page":"231","volume-title":"Software Fault Tolerance","author":"Huang Y.","year":"1995"},{"key":"e_1_2_8_2_13_1","first-page":"399","volume-title":"AIAA\/IEEE 8th Digital Avionics Systems Conference","author":"Bleeg R. J.","year":"1988"},{"key":"e_1_2_8_2_14_1","first-page":"407","volume-title":"AIAA\/IEEE 8th Digital Avionics Systems Conference","author":"Hills A. D.","year":"1988"},{"key":"e_1_2_8_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2002.1028474"},{"key":"e_1_2_8_2_16_1","volume-title":"Computer Related Risks","author":"Neuman P. G.","year":"1995"},{"key":"e_1_2_8_2_17_1","first-page":"189","volume-title":"Software Fault Tolerance","author":"Kim K. H.","year":"1995"},{"key":"e_1_2_8_2_18_1","unstructured":"W. Torres\u2010Pomales 2000 Hampton Virginia NASA Langley Research Center"},{"key":"e_1_2_8_2_19_1","volume-title":"Fault Tolerant Computer System Design","author":"Pradhan D. K.","year":"1996"},{"key":"e_1_2_8_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7091-8990-0"},{"key":"e_1_2_8_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/361227.361230"},{"key":"e_1_2_8_2_22_1","unstructured":"F.Cristian Exception handling and software fault tolerance Proc. of the 10th International Symposium on Fault\u2010Tolerant Computing (FTCS\u201010) 1980 pp.97\u2013103."},{"key":"e_1_2_8_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.83905"},{"key":"e_1_2_8_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6312924"},{"key":"e_1_2_8_2_25_1","first-page":"211","volume-title":"Software Fault Tolerance","author":"Bishop P. G.","year":"1995"},{"key":"e_1_2_8_2_26_1","unstructured":"J. C.Laprie J.Arlat C.Beounes K.Kanoun andC.Hourtolle Hardware and software fault tolerance: definition and analysis of architectural solutions Proc. of the 17th International Symposium on Fault\u2010Tolerant Computing (FTCS\u201017) Pittsburgh PA:1987 pp.116\u2013121."},{"key":"e_1_2_8_2_27_1","unstructured":"K. H.Kim Distributed execution of recovery blocks: an approach to uniform treatment of hardware and software faults Proc. of the 4th International Conference on Distributed Computing Systems 1984 pp.526\u2013532."},{"key":"e_1_2_8_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.233463"},{"key":"e_1_2_8_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/24.589928"},{"key":"e_1_2_8_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.231895"},{"key":"e_1_2_8_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.58771"},{"key":"e_1_2_8_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1191798"},{"key":"e_1_2_8_2_33_1","first-page":"109","volume-title":"Software Fault Tolerance","author":"Dugan J. B.","year":"1995"},{"key":"e_1_2_8_2_34_1","first-page":"139","volume-title":"Software Fault Tolerance","author":"Tomek L. A.","year":"1995"},{"key":"e_1_2_8_2_35_1","doi-asserted-by":"crossref","unstructured":"J.Kelly D.Eckhardt M.Vouk D.McAllister andA.Caglayan A large scale generation experiment in multi\u2010version software: description and early results Proc. of the 18th International Symposium on Fault\u2010Tolerant Computing 1988 pp.9\u201314.","DOI":"10.1109\/FTCS.1988.5290"},{"key":"e_1_2_8_2_36_1","doi-asserted-by":"crossref","unstructured":"M. A.Vouk A.Caglayan D. E.Eckhardt J.Kelly J.Knight D.McAllister andL.Walker Analysis of faults detected in a large\u2010scale multi\u2010version software development experiment Proc. of the Digital Avionics Systems Conference 1990 pp.378\u2013385.","DOI":"10.1109\/DASC.1990.111318"},{"key":"e_1_2_8_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/24.229486"},{"key":"e_1_2_8_2_38_1","unstructured":"J. P.KellyandA.Avizienis A specification\u2010oriented multi\u2010version software experiment Proc. of the 13th Annual International Symposium on Fault\u2010Tolerant Computing (FTCS\u201013) Milano 1983 pp.120\u2013126."},{"key":"e_1_2_8_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.231894"},{"key":"e_1_2_8_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6313048"},{"key":"e_1_2_8_2_41_1","first-page":"71","volume-title":"IEEE Software","author":"Hatton L.","year":"1997"},{"key":"e_1_2_8_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2001.936214"},{"key":"e_1_2_8_2_43_1","doi-asserted-by":"crossref","unstructured":"M. R.Lyu Z.Huang K. S.Sze andX.Cai An empirical study on testing and fault tolerance for software reliability engineering Proc. of the 14th IEEE International Symposium on Software Reliability Engineering (ISSRE'2003) Denver Colorado 2003 pp.119\u2013130.","DOI":"10.1109\/ISSRE.2003.1251036"},{"key":"e_1_2_8_2_44_1","unstructured":"M. R.Lyu A design paradigm for multi\u2010version software Ph.D. dissertation UCLA Los Angeles May1988."},{"key":"e_1_2_8_2_45_1","doi-asserted-by":"crossref","unstructured":"P.Traverse Dependability of digital computers on board airplanes Proc. of the 2nd IFIP Working Conference on Dependable Computing for Critical Applications Tucson Arizona 1991 pp.133\u2013152.","DOI":"10.1007\/978-3-7091-9123-1_6"},{"key":"e_1_2_8_2_46_1","unstructured":"P.PopovandL.Strigini Diversity with off\u2010the\u2010shelf components: a study with SQL database servers Proc. of the International Conference on Dependable Systems and Networks (DSN 2003) 2003 pp.B84\u2013B85."},{"key":"e_1_2_8_2_47_1","unstructured":"X.ChenandM. R.Lyu Message logging and recovery in wireless corba using access bridge Proc. of the 6th International Symposium on Autonomous Decentralized Systems (ISADS2003) Pisa Italy 2003 pp.107\u2013114."},{"key":"e_1_2_8_2_48_1","unstructured":"P.TownendandJ.Xu Fault tolerance within a grid environment Proc. of the UK e\u2010Science All Hands Meeting 2003 Nottingham UK 2003 pp.272\u2013275."},{"key":"e_1_2_8_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.774907"}],"container-title":["Wiley Encyclopedia of Computer Science and Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/9780470050118.ecse154","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T09:20:13Z","timestamp":1737624013000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/9780470050118.ecse154"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,12,14]]},"ISBN":["9780471383932","9780470050118"],"references-count":49,"alternative-id":["10.1002\/9780470050118.ecse154","10.1002\/9780470050118"],"URL":"https:\/\/doi.org\/10.1002\/9780470050118.ecse154","archive":["Portico"],"relation":{},"subject":[],"published":{"date-parts":[[2007,12,14]]}}}