{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:49:31Z","timestamp":1742971771966,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540291893"},{"type":"electronic","value":"9783540320845"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11562436_22","type":"book-chapter","created":{"date-parts":[[2005,10,19]],"date-time":"2005-10-19T09:40:51Z","timestamp":1129714851000},"page":"290-304","source":"Crossref","is-referenced-by-count":1,"title":["Modeling and Verification of Safety-Critical Systems Using Safecharts"],"prefix":"10.1007","author":[{"given":"Pao-Ann","family":"Hsiung","sequence":"first","affiliation":[]},{"given":"Yen-Hung","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1023\/A:1015346419267","volume":"23","author":"K. Altisen","year":"2002","unstructured":"Altisen, K., G\u00f6ssler, G., Sifakis, J.: Scheduler modeling based on the controller synthesis paradigm. Real-Time Systems\u00a023, 55\u201384 (2002)","journal-title":"Real-Time Systems"},{"key":"22_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/BFb0025774","volume-title":"Logics of Programs","author":"E.M. Clarke","year":"1982","unstructured":"Clarke, E.M., Emerson, E.A.: Design and sythesis of synchronization skeletons using branching time temporal logic. In: Kozen, D. (ed.) Logic of Programs 1981. LNCS, vol.\u00a0131, pp. 52\u201371. Springer, Heidelberg (1982)"},{"key":"22_CR3","volume-title":"Model Checking","author":"E.M. Clarke","year":"1999","unstructured":"Clarke, E.M., Grumberg, O., Peled, D.A.: Model Checking. MIT Press, Cambridge (1999)"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Dammag, H., Nissanke, N.: Safecharts for specifying and designing safety critical systems. In: Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems, pp. 78\u201387 (October 1999)","DOI":"10.1109\/RELDIS.1999.805085"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Henzinger, T.A., Nicollin, X., Sifakis, J., Yovine, S.: Symbolic model checking for reat-time systems. In: Proceedings of the IEEE International Conference on Logics in Computer Science (LICS), pp. 394\u2013406 (June 1992)","DOI":"10.1109\/LICS.1992.185551"},{"key":"22_CR6","unstructured":"Hsiung, P.-A., Wang, F.: A state-graph manipulator tool for real-time system specification and verification. In: Proceedings of the 5th International Conference on Real-Time Computing Systems and Applications (RTCSA) (October 1998)"},{"key":"22_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1007\/BFb0020979","volume-title":"Hybrid Systems III","author":"K.G. Larsen","year":"1996","unstructured":"Larsen, K.G., Steffen, B., Weise, C.: Fischer\u2019s protocol revisited: A simple proof using model constraints. In: Alur, R., Sontag, E.D., Henzinger, T.A. (eds.) HS 1995. LNCS, vol.\u00a01066, pp. 604\u2013615. Springer, Heidelberg (1996)"},{"key":"22_CR8","unstructured":"Lavazza, L. (ed.): A methodology for formalising concepts underlying the DESS notation. ITEA (December 2001)"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Nissanke, N., Dammag, H.: Risk bands - a novel feature of Safecharts. In: Proceedings of the 11th International Symposium on Software Reliability Engineering (ISSRE), pp. 293\u2013301 (October 2000)","DOI":"10.1109\/ISSRE.2000.885880"},{"key":"22_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/3-540-40891-6_34","volume-title":"Computer Safety, Reliability, and Security","author":"N. Nissanke","year":"2000","unstructured":"Nissanke, N., Dammag, H.: Risk ordering of states in safecharts. In: Koornneef, F., van der Meulen, M.J.P. (eds.) SAFECOMP 2000. LNCS, vol.\u00a01943, pp. 395\u2013405. Springer, Heidelberg (2000)"},{"issue":"9","key":"22_CR11","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1016\/S0925-7535(01)00089-3","volume":"40","author":"N. Nissanke","year":"2002","unstructured":"Nissanke, N., Dammag, H.: Design for safety in safecharts with risk ordering of states. Safety Science\u00a040(9), 753\u2013763 (2002)","journal-title":"Safety Science"},{"key":"22_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/3-540-11494-7_22","volume-title":"International Symposium on Programming","author":"J.-P. Queille","year":"1982","unstructured":"Queille, J.-P., Sifakis, J.: Specification and verification of concurrent systems in CESAR. In: Dezani-Ciancaglini, M., Montanari, U. (eds.) Programming 1982. LNCS, vol.\u00a0137, pp. 337\u2013351. Springer, Heidelberg (1982)"},{"key":"22_CR13","volume-title":"Software Engineering","author":"I. Sommerville","year":"2001","unstructured":"Sommerville, I.: Software Engineering, 6th edn. Addison-Wesley, Reading (2001)","edition":"6"},{"issue":"1","key":"22_CR14","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/12.980017","volume":"51","author":"F. Wang","year":"2002","unstructured":"Wang, F., Hsiung, P.-A.: Efficient and user-friendly verification. IEEE Transactions on Computers\u00a051(1), 61\u201383 (2002)","journal-title":"IEEE Transactions on Computers"}],"container-title":["Lecture Notes in Computer Science","Formal Techniques for Networked and Distributed Systems - FORTE 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11562436_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,5]],"date-time":"2025-01-05T01:44:49Z","timestamp":1736041489000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11562436_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540291893","9783540320845"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11562436_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}