{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:51:34Z","timestamp":1725573094355},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540262862"},{"type":"electronic","value":"9783540316664"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11499909_13","type":"book-chapter","created":{"date-parts":[[2010,12,20]],"date-time":"2010-12-20T11:56:28Z","timestamp":1292846188000},"page":"156-166","source":"Crossref","is-referenced-by-count":2,"title":["Non-intrusive System Level Fault-Tolerance"],"prefix":"10.1007","author":[{"given":"Kristina","family":"Lundqvist","sequence":"first","affiliation":[]},{"given":"Jayakanth","family":"Srinivasan","sequence":"additional","affiliation":[]},{"given":"S\u00e9bastien","family":"Gorelov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/BFb0032042","volume-title":"Automata, Languages and Programming","author":"R. Alur","year":"1990","unstructured":"Alur, R., Dill, D.L.: Automata for modeling real-time systems. In: Paterson, M. (ed.) ICALP 1990. LNCS, vol.\u00a0443, pp. 322\u2013335. Springer, Heidelberg (1990)"},{"issue":"4","key":"13_CR2","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/340396.340450","volume":"XIX","author":"A. Burns","year":"1999","unstructured":"Burns, A.: The Ravenscar Profile. ACM Ada Letters\u00a0XIX(4), 49\u201352 (1999)","journal-title":"ACM Ada Letters"},{"key":"13_CR3","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1023\/A:1021758401878","volume":"24","author":"A. Burns","year":"2003","unstructured":"Burns, A.: How to Verify a Safe Real-Time System: The Application of Model Checking and Timed Automata to the Production Cell Case Study. Real-Time Systems\u00a024, 135\u2013151 (2003)","journal-title":"Real-Time Systems"},{"key":"13_CR4","unstructured":"Burns, A., Dobbing, B., Vardanega, T.: Guide for the Use of the Ada Ravenscar Profile in High Integrity Systems. University of York Technical Report YCS-2003-348 (2003)"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"de la Puente, J.A., Zamorano, J.: Execution-Time Clocks and Ravenscar Kernels. Ada Letters\u00a0XXIII(4) (December 2003)","DOI":"10.1145\/959221.959237"},{"key":"13_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-540-30080-9_7","volume-title":"Formal Methods for the Design of Real-Time Systems","author":"G. Behrmann","year":"2004","unstructured":"Behrmann, G., David, A., Larsen, K.G.: A tutorial on uppaal. In: Bernardo, M., Corradini, F. (eds.) SFM-RT 2004. LNCS, vol.\u00a03185, pp. 200\u2013236. Springer, Heidelberg (2004)"},{"key":"13_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/BFb0054997","volume-title":"Reliable Software Technologies - Ada-Europe \u201998","author":"M.G. Harbour","year":"1998","unstructured":"Harbour, M.G., Rivas, M.A., et al.: Implementing and using execution time clocks in ada hard real-time applications. In: Asplund, L. (ed.) Ada-Europe 1998. LNCS, vol.\u00a01411, pp. 90\u2013101. Springer, Heidelberg (1998)"},{"key":"13_CR8","volume-title":"Introduction of Automata Theory, Languages, and Computation","author":"J.E. Hopcroft","year":"2001","unstructured":"Hopcroft, J.E., Ullman, J.D.: Introduction of Automata Theory, Languages, and Computation. Addison Wesley, Reading (2001)"},{"key":"13_CR9","unstructured":"ISO\/IEC Ada 95 Reference Manual, Language and Standard Libraries, Version 6.0"},{"key":"13_CR10","unstructured":"Lee, P.A., Anderson, T.: Fault Tolerance: Principles and Practice (Second Revised edn.). Springer, New York"},{"issue":"1","key":"13_CR11","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1145\/321738.321743","volume":"20","author":"C.L. Liu","year":"1973","unstructured":"Liu, C.L., Layland, J.W.: Scheduling Algorithms for Multiprogramming in a Hard-Real-Time Environment. Journal of the ACM (JACM)\u00a020(1), 46\u201361 (1973)","journal-title":"Journal of the ACM (JACM)"},{"issue":"4","key":"13_CR12","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/0166-5316(82)90024-4","volume":"2","author":"J.Y.T. Leung","year":"1982","unstructured":"Leung, J.Y.T., Whitehead, J.: On the complexity of fixed-priority scheduling of periodic real-time tasks. Performance Evaluation\u00a02(4), 237\u2013250 (1982)","journal-title":"Performance Evaluation"},{"key":"13_CR13","unstructured":"Pettersson, P., Larsen, K.G.: UPPAAL2k. In: Bulletin of the European Association for Theoretical Computer Science, vol.\u00a070, pp. 40\u201344 (2000)"},{"key":"13_CR14","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1023\/B:TIME.0000016129.97430.c6","volume":"4","author":"J. Real","year":"2004","unstructured":"Real, J., Crespo, A.: Mode Change Protocols for Real-Time Systems: A Survey and a New Proposal. Real-Time Systems\u00a04, 161\u2013197 (2004)","journal-title":"Real-Time Systems"},{"key":"13_CR15","volume-title":"Resource Management in Real-Time Systems and Networks","author":"C.S. Ram Murthy","year":"2001","unstructured":"Ram Murthy, C.S., Manimaran, G.: Resource Management in Real-Time Systems and Networks. The MIT Press, Cambridge (2001)"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Silbovitz, A.: RavenHaRT- A Hardware Implementation of a Ravenscar Compliant Kernel, SM Thesis, Aeronautics and Astronautics, MIT (2003)","DOI":"10.1109\/DASC.2003.1245822"},{"key":"13_CR17","unstructured":"Torres-Pomales, W.: Software Fault-Tolerance: A Tutorial, NASA Technical Report, NASA-2000-tm210616 (2000)"},{"key":"13_CR18","unstructured":"Virtex-II Pro Platform FPGA Handbook, v1.0 (2002), http:\/\/www.xilinx.com"}],"container-title":["Lecture Notes in Computer Science","Reliable Software Technology \u2013 Ada-Europe 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11499909_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T15:02:00Z","timestamp":1605625320000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11499909_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540262862","9783540316664"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/11499909_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}