{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T22:40:23Z","timestamp":1740264023165,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540263012"},{"type":"electronic","value":"9783540315599"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11494744_23","type":"book-chapter","created":{"date-parts":[[2010,7,14]],"date-time":"2010-07-14T02:31:09Z","timestamp":1279074669000},"page":"403-422","source":"Crossref","is-referenced-by-count":0,"title":["Specifying and Analyzing Software Safety Requirements of a Frequency Converter Using Coloured Petri Nets"],"prefix":"10.1007","author":[{"given":"Lisa","family":"Wells","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Maier","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","volume-title":"Safeware: System Safety and Computers","author":"N. Leveson","year":"1995","unstructured":"Leveson, N.: Safeware: System Safety and Computers. Addison-Wesley, Reading (1995)"},{"key":"23_CR2","unstructured":"International Electrotechnical Commission: Functional Safety of Electrical\/ Electronic\/ Programmable Electronic Safety-Related Systems. 1st edn (1998-2000) International Standard IEC 61508, Parts 1-7"},{"key":"23_CR3","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/0167-6423(87)90035-9","volume":"8","author":"D. Harel","year":"1987","unstructured":"Harel, D.: Statecharts: A visual formalism for complex systems. Science of Computer Programming\u00a08, 231\u2013274 (1987)","journal-title":"Science of Computer Programming"},{"key":"23_CR4","series-title":"Basic Concepts. Monographs in Theoretical Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-60794-3","volume-title":"Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use","author":"K. Jensen","year":"1997","unstructured":"Jensen, K.: Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use. Basic Concepts. Monographs in Theoretical Computer Science, vol.\u00a01. Springer, Heidelberg (1997), 2nd corrected printing"},{"key":"23_CR5","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/s100090050021","volume":"2","author":"L.M. Kristensen","year":"1998","unstructured":"Kristensen, L.M., Christensen, S., Jensen, K.: The practitioner\u2019s guide to coloured Petri nets. International Journal on Software Tools for Technology Transfer\u00a02, 98\u2013132 (1998)","journal-title":"International Journal on Software Tools for Technology Transfer"},{"key":"23_CR6","unstructured":"CPN Tools, http:\/\/www.daimi.au.dk\/CPNTools\/"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Kruchten, P.: The 4+1 view model of architecture. IEEE Software\u00a012 (1995)","DOI":"10.1109\/52.469759"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Bardram, J., Christensen, H.B., Hansen, K.M.: Architectural prototyping: An approach for grounding architectural design and learning. In: Proceedings of the 4th Working IEEE\/IFIP Conference on Software Architecture, pp. 15\u201324 (2004)","DOI":"10.1109\/WICSA.2004.1310686"},{"key":"23_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45732-1_21","volume-title":"Computer Safety, Reliability and Security","author":"A. Bobbio","year":"2002","unstructured":"Bobbio, A., Ciancamerla, E., Franceschinis, G., Gaeta, R., Minichino, M., Portinale, L.: Methods of increasing modelling power for safety analysis, applied to a turbine digital control system. In: Anderson, S., Bologna, S., Felici, M. (eds.) SAFECOMP 2002. LNCS, vol.\u00a02434. Springer, Heidelberg (2002)"},{"key":"23_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1007\/3-540-48249-0_18","volume-title":"Computer Safety, Reliability and Security","author":"J. Campelo","year":"1999","unstructured":"Campelo, J., Yuste, P., Rodriguez, F., Gil, P., Serrano, J.: Hierarchical reliability and safety models of fault tolerant distributed industrial control systems. In: Felici, M., Kanoun, K., Pasquini, A. (eds.) SAFECOMP 1999. LNCS, vol.\u00a01698, p. 202. Springer, Heidelberg (1999)"},{"key":"23_CR11","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/S0951-8320(02)00159-X","volume":"80","author":"H.S. Son","year":"2003","unstructured":"Son, H.S., Seong, P.H.: Development of a safety critical software requirements verification method with combined CPN and PVS: a nuclear power plant protection system application. Reliability Engineering and System Safety\u00a080, 19\u201332 (2003)","journal-title":"Reliability Engineering and System Safety"},{"key":"23_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/3-540-48249-0_31","volume-title":"Computer Safety, Reliability and Security","author":"M. Heiner","year":"1999","unstructured":"Heiner, M., Heisel, M.: Modeling safety-critical systems with Z and Petri nets. In: Felici, M., Kanoun, K., Pasquini, A. (eds.) SAFECOMP 1999. LNCS, vol.\u00a01698, p. 361. Springer, Heidelberg (1999)"},{"key":"23_CR13","series-title":"Lecture Notes in Computer Science","first-page":"299","volume-title":"Application and Theory of Petri Nets 2002","author":"L. Lorentsen","year":"2002","unstructured":"Lorentsen, L., Tuovinen, A.P., Xu, J.: Modelling of features and feature interactions in nokia mobile phones using coloured petri nets. In: Esparza, J., Lakos, C.A. (eds.) ICATPN 2002. LNCS, vol.\u00a02360, pp. 299\u2013313. Springer, Heidelberg (2002)"},{"key":"23_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/3-540-44919-1_18","volume-title":"Applications and Theory of Petri Nets 2003","author":"J.B. Jrgensen","year":"2003","unstructured":"Jrgensen, J.B.: Coloured Petri nets in development of a pervasive health care system. In: van der Aalst, W.M.P., Best, E. (eds.) ICATPN 2003. LNCS, vol.\u00a02679, pp. 256\u2013275. Springer, Heidelberg (2003)"},{"key":"23_CR15","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1145\/568760.568807","volume-title":"Proceedings of the 14th international conference on Software Engineering and Knowledge Engineering","author":"K. Fukuzawa","year":"2002","unstructured":"Fukuzawa, K., Saeki, M.: Evaluating software architectures by coloured Petri nets. In: Proceedings of the 14th international conference on Software Engineering and Knowledge Engineering, pp. 263\u2013270. ACM Press, New York (2002)"},{"key":"23_CR16","volume-title":"Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems","author":"H. Dammag","year":"1999","unstructured":"Dammag, H., Nissanke, N.: Safecharts for specifying and designing safety critical systems. In: Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems. IEEE, Los Alamitos (1999)"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Heimdahl, M., Leveson, N.: Completeness and consistency checking of software requirements. IEEE Transactions on Software Engineering\u00a022 (1996)","DOI":"10.1109\/32.508311"},{"key":"23_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/3-540-45416-0_5","volume-title":"Computer Safety, Reliability and Security","author":"Z. Pap","year":"2001","unstructured":"Pap, Z., Majzik, I., Pataricza, A.: Checking general safety criteria on UML Statecharts. In: Voges, U. (ed.) SAFECOMP 2001. LNCS, vol.\u00a02187, p. 46. Springer, Heidelberg (2001)"},{"key":"23_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/3-540-49646-7_2","volume-title":"Computer Safety, Reliability and Security","author":"K. Winter","year":"1998","unstructured":"Winter, K., Santen, T., Heisel, M.: An agenda for specifying software components with complex data models. In: Ehrenberger, W. (ed.) SAFECOMP 1998. LNCS, vol.\u00a01516, p. 16. Springer, Heidelberg (1998)"},{"key":"23_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/3-540-40891-6_4","volume-title":"Computer Safety, Reliability, and Security","author":"J. Katwijk van","year":"2000","unstructured":"van Katwijk, J., et al.: Specification and verification of a safety shell with statecharts and extended timed graphs. In: Koornneef, F., van der Meulen, M.J.P. (eds.) SAFECOMP 2000. LNCS, vol.\u00a01943, p. 37. Springer, Heidelberg (2000)"}],"container-title":["Lecture Notes in Computer Science","Applications and Theory of Petri Nets 2005"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11494744_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T22:05:00Z","timestamp":1740261900000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11494744_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540263012","9783540315599"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/11494744_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}