{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T08:03:08Z","timestamp":1772784188946,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540457626","type":"print"},{"value":"9783540457633","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11875567_12","type":"book-chapter","created":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T13:25:27Z","timestamp":1158931527000},"page":"156-169","source":"Crossref","is-referenced-by-count":22,"title":["Component-Based Hazard Analysis: Optimal Designs, Product Lines, and Online-Reconfiguration"],"prefix":"10.1007","author":[{"given":"Holger","family":"Giese","sequence":"first","affiliation":[]},{"given":"Matthias","family":"Tichy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1109\/ICSE.2003.1201228","volume-title":"Proceedings of the 25th International Conference on Software Engineering (ICSE)","author":"K. Grimm","year":"2003","unstructured":"Grimm, K.: Software technology in an automotive company: major challenges. In: Proceedings of the 25th International Conference on Software Engineering (ICSE), pp. 498\u2013503. IEEE Computer Society, Washington (2003)"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/3-540-47833-7_15","volume-title":"Software Product-Family Engineering","author":"P. Knauber","year":"2002","unstructured":"Knauber, P., Bermejo, J., B\u00f6ckle, G., do Prado Leite, J.C., van der Linden, F., Northrop, L., Stark, M., Weiss, D.M.: Quantifying product line benefits. In: van der Linden, F.J. (ed.) PFE 2002. LNCS, vol.\u00a02290, pp. 155\u2013163. Springer, Heidelberg (2002)"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1145\/581413.581415","volume-title":"ICSE 2002: Proc.\u00a0of the 24th International Conference on Software Engineering","author":"K. Schmid","year":"2002","unstructured":"Schmid, K.: A comprehensive product line scoping approach and its validation. In: ICSE 2002: Proc.\u00a0of the 24th International Conference on Software Engineering, pp. 593\u2013603. ACM Press, New York (2002)"},{"issue":"4","key":"12_CR4","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MS.2002.1020289","volume":"19","author":"S. Thiel","year":"2002","unstructured":"Thiel, S., Hein, A.: Modeling and using product line variability in automotive systems. IEEE Software\u00a019(4), 66\u201372 (2002)","journal-title":"IEEE Software"},{"key":"12_CR5","unstructured":"Wirsing, M. (ed.): Report on the EU\/NSF Strategic Workshop on Engineering Software-Intensive Systems, Edinburgh, GB (2004)"},{"issue":"5","key":"12_CR6","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/274946.274958","volume":"41","author":"J. Sztipanovits","year":"1998","unstructured":"Sztipanovits, J., Karsai, G., Bapty, T.: Self-adaptive software for signal processing. Commun. ACM\u00a041(5), 66\u201373 (1998)","journal-title":"Commun. ACM"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-540-30138-7_15","volume-title":"Computer Safety, Reliability, and Security","author":"H. Giese","year":"2004","unstructured":"Giese, H., Tichy, M., Schilling, D.: Compositional Hazard Analysis of UML Components and Deployment Models. In: Heisel, M., Liggesmeyer, P., Wittmann, S. (eds.) SAFECOMP 2004. LNCS, vol.\u00a03219. Springer, Heidelberg (2004)"},{"key":"12_CR8","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/940071.940078","volume-title":"Proc.\u00a0of the 9th European software engineering conference held jointly with 11th ACM SIGSOFT international symposium on Foundations of software engineering (ESEC\/FSE-11)","author":"H. Giese","year":"2003","unstructured":"Giese, H., Tichy, M., Burmester, S., Sch\u00e4fer, W., Flake, S.: Towards the Compositional Verification of Real-Time UML Designs. In: Proc.\u00a0of the 9th European software engineering conference held jointly with 11th ACM SIGSOFT international symposium on Foundations of software engineering (ESEC\/FSE-11), pp. 38\u201347. ACM Press, New York (2003)"},{"key":"12_CR9","unstructured":"McDermid, J.A.: Trends in Systems Safety: A European View? In: Lindsay, P. (ed.) Seventh Australian Workshop on Industrial Experience with Safety Critical Systems and Software, Adelaide, Australia. Conferences in Research and Practice in Information Technology, vol.\u00a015, pp. 3\u20138. ACS (2003)"},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/S0951-8320(00)00076-4","volume":"71","author":"Y. Papadopoulos","year":"2001","unstructured":"Papadopoulos, Y., McDermid, J., Sasse, R., Heiner, G.: Analysis and synthesis of the behaviour of complex programmable electronic systems in conditions of failure. Reliability Engineering & System Safety\u00a071, 229\u2013247 (2001)","journal-title":"Reliability Engineering & System Safety"},{"key":"12_CR11","unstructured":"Kaiser, B., Liggesmeyer, P., Maeckel, O.: A New Component Concept for Fault Trees. In: Proceedings of the 8th National Workshop on Safety Critical Systems and Software (SCS 2003), Canberra, Australia, October 9-10, 2003. Research and Practice in Information Technology, vol.\u00a033 (2003)"},{"key":"12_CR12","unstructured":"Grunske, L., Neumann, R.: Quality Improvement by Integrating Non-Functional Properties in Software Architecture Specification. In: Proc.\u00a0of the Second Workshop on Evaluating and Architecting System dependabilitY (EASY), San Jose, California, USA, October 6, 2002 (2002)"},{"key":"12_CR13","unstructured":"Grunske, L.: Transformational Patterns for the Improvement of Safety. In: Proc. of the The Second Nordic Conference on Pattern Languages of Programs (VikingPLoP 2003). Microsoft Buisness Press (2003)"},{"issue":"1","key":"12_CR14","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/381766.381770","volume":"2","author":"P. Fenelon","year":"1994","unstructured":"Fenelon, P., McDermid, J.A., Nicolson, M., Pumfrey, D.J.: Towards integrated safety analysis and design. ACM SIGAPP Applied Computing Review\u00a02(1), 21\u201332 (1994)","journal-title":"ACM SIGAPP Applied Computing Review"},{"key":"12_CR15","series-title":"Lecture Notes in Computer Science","first-page":"17","volume-title":"Recent Trends in Data Type Specification","author":"J. McDermid","year":"1995","unstructured":"McDermid, J., Pumfrey, D.: A Development of Hazard Analysis to aid Software Design. In: Reggio, G., Astesiano, E., Tarlecki, A. (eds.) Abstract Data Types 1994 and COMPASS 1994. LNCS, vol.\u00a0906, pp. 17\u201325. Springer, Heidelberg (1995)"},{"key":"12_CR16","volume-title":"Modern control engineering","author":"K. Ogata","year":"1990","unstructured":"Ogata, K.: Modern control engineering. Prentice Hall, Englewood Cliffs (1990)"},{"key":"12_CR17","volume-title":"Real-Time Object-Oriented Modeling","author":"B. Selic","year":"1994","unstructured":"Selic, B., Gullekson, G., Ward, P.: Real-Time Object-Oriented Modeling. John Wiley and Sons, Chichester (1994)"},{"key":"12_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/11563228_3","volume-title":"Computer Safety, Reliability, and Security","author":"N. Addouche","year":"2005","unstructured":"Addouche, N., Antoine, C., Montmain, J.: Combining Extended UML Models and Formal Methods to Analyze Real-Time Systems. In: Winther, R., Gran, B.A., Dahll, G. (eds.) SAFECOMP 2005. LNCS, vol.\u00a03688, pp. 24\u201336. Springer, Heidelberg (2005)"},{"key":"12_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1007\/978-3-540-27863-4_26","volume-title":"Integration of Software Specification Techniques for Applications in Engineering","author":"F. Ortmeier","year":"2004","unstructured":"Ortmeier, F., Thums, A., Schellhorn, G., Reif, W.: Combining Formal Methods and Safety Analysis - The ForMoSa Approach. In: Ehrig, H., Damm, W., Desel, J., Gro\u00dfe-Rhode, M., Reif, W., Schnieder, E., Westk\u00e4mper, E. (eds.) INT 2004. LNCS, vol.\u00a03147, pp. 474\u2013493. Springer, Heidelberg (2004)"},{"key":"12_CR20","unstructured":"Giese, H., Burmester, S., Klein, F., Schilling, D., Tichy, M.: Multi-Agent System Design for Safety-Critical Self-Optimizing Mechatronic Systems with UML. In: Henderson-Sellers, B., Debenham, J. (eds.) OOPSLA 2003 - Second International Workshop on Agent-Oriented Methodologies, Anaheim, CA, USA, Center for Object Technology Applications and Research (COTAR), University of Technology, Sydney, Australia, pp. 21\u201332 (2003)"},{"key":"12_CR21","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/TR.2003.809272","volume":"52","author":"A. Rauzy","year":"2003","unstructured":"Rauzy, A.: A new methodology to handle Boolean models with loops. IEEE Transactions on Reliability\u00a052, 96\u2013105 (2003)","journal-title":"IEEE Transactions on Reliability"},{"issue":"3","key":"12_CR22","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1145\/136035.136043","volume":"24","author":"R.E. Bryant","year":"1992","unstructured":"Bryant, R.E.: Symbolic Boolean manipulation with ordered binary-decision diagrams. ACM Computing Surveys\u00a024(3), 293\u2013318 (1992)","journal-title":"ACM Computing Surveys"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11875567_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:24:58Z","timestamp":1619508298000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11875567_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540457626","9783540457633"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/11875567_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}