{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T21:13:53Z","timestamp":1760044433100},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540457626"},{"type":"electronic","value":"9783540457633"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11875567_21","type":"book-chapter","created":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T09:25:27Z","timestamp":1158917127000},"page":"275-288","source":"Crossref","is-referenced-by-count":17,"title":["Towards a Unified Model-Based Safety Assessment"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Peikenkamp","sequence":"first","affiliation":[]},{"given":"Antonella","family":"Cavallo","sequence":"additional","affiliation":[]},{"given":"Laura","family":"Valacca","sequence":"additional","affiliation":[]},{"given":"Eckard","family":"B\u00f6de","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Pretzer","sequence":"additional","affiliation":[]},{"given":"E. Moritz","family":"Hahn","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","volume-title":"Modelling Reactive Systems with Statecharts: The STATEMATE Approach","author":"D. Harel","year":"1998","unstructured":"Harel, D., Politi, M.: Modelling Reactive Systems with Statecharts: The STATEMATE Approach. McGraw-Hill, New York (1998)"},{"key":"21_CR2","unstructured":"The MathWorks: Simulink \u2014 Model-Based and System-Based Design (2004)"},{"key":"21_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/10722167_45","volume-title":"Computer Aided Verification","author":"T. Bienm\u00fcller","year":"2000","unstructured":"Bienm\u00fcller, T., Damm, W., Wittke, H.: The STATEMATE Verification Environment - Making It Real. In: Emerson, E.A., Sistla, A.P. (eds.) CAV 2000. LNCS, vol.\u00a01855, pp. 561\u2013567. Springer, Heidelberg (2000)"},{"key":"21_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/11563228_10","volume-title":"Computer Safety, Reliability, and Security","author":"A. Joshi","year":"2005","unstructured":"Joshi, A., Heimdahl, M.P.: Model-Based Safety Analysis of Simulink Models Using SCADE Design Verifier. In: Winther, R., Gran, B.A., Dahll, G. (eds.) SAFECOMP 2005. LNCS, vol.\u00a03688, pp. 122\u2013135. Springer, Heidelberg (2005)"},{"key":"21_CR5","unstructured":"ARP4761: Guidelines and Methods for Conducting the Safety Assessment Process on Civil Airborne Systems and Equipment. Aerospace Recommended Practice, Society of Automotive Engineers, Detroit, USA (1996)"},{"key":"21_CR6","unstructured":"Peikenkamp, T., Cavallo, A., Valacca, L., B\u00f6de, E., Pretzer, M., Hahn, E.M. (2006), \n                    \n                      http:\/\/seshome.informatik.uni-oldenburg.de\/~sesdocs\/safecomp2006"},{"key":"21_CR7","volume-title":"Model Checking","author":"E. Clarke","year":"1999","unstructured":"Clarke, E., Grumberg, O., Peled, D.: Model Checking. MIT Press, Cambridge (1999)"},{"key":"21_CR8","unstructured":"I-Logix: ModelCertifier User Manual. I-Logix, Andover, MA (2002\/2003)"},{"key":"21_CR9","unstructured":"Vesely, W.E., Goldberg, F., Roberts, N.H., Haasl, D.F.: Fault Tree Handbook. NUREG-0492. U.S. Nuclear Regulatory Commission, Washington, DC (1981)"},{"key":"21_CR10","unstructured":"Peikenkamp, T., B\u00f6de, E., Br\u00fcckner, I., Spenke, H., Bretschneider, M., Holberg, H.: Model-based Safety Analysis of a Flap Control System. In: Proc.\u00a0of INCOSE, Toulouse (2004)"},{"key":"21_CR11","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2892-7","volume-title":"Binary Decision Diagrams \u2013 Theory and Implementation","author":"R. Drechsler","year":"1998","unstructured":"Drechsler, R., Becker, B.: Binary Decision Diagrams \u2013 Theory and Implementation. Kluwer Academic Publishers, Dordrecht (1998)"},{"key":"21_CR12","unstructured":"Somenzi, F.: CUDD: CU Decision Diagram Package Release 2.4.1. University of Colorado at Boulder (2005)"},{"key":"21_CR13","unstructured":"Schellhorn, G., Thums, A., Reif, W.: Formal fault tree semantics. In: IDPT 2002: Interated Design and Process Technology (2002)"},{"key":"21_CR14","unstructured":"Hansen, K.M.: Linking Safety Analysis to Safety Requirements. Ph.D thesis, Institut for Informationsteknologi, DTU Lyngby (1996)"},{"key":"21_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/b94154","volume-title":"FME 2003: Formal Methods","author":"A. Sch\u00e4fer","year":"2003","unstructured":"Sch\u00e4fer, A.: Combining real-time model-checking and fault tree analysis. In: Araki, K., Gnesi, S., Mandrioli, D. (eds.) FME 2003. LNCS, vol.\u00a02805. Springer, Heidelberg (2003)"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Papadopoulos, Y., Maruhn, M.: Model-based synthesis of fault trees from Matlab-Simulink models. In: The International Conference on Dependable Systems and Networks (DSN 2001) (2001)","DOI":"10.1109\/DSN.2001.941393"},{"key":"21_CR17","volume-title":"Hierarchically performed hazard origin and propagation studies","author":"Y. Papadopoulos","year":"1999","unstructured":"Papadopoulos, Y., McDermid, J.A.: Hierarchically performed hazard origin and propagation studies. Springer, Heidelberg (1999)"},{"key":"21_CR18","unstructured":"Bozzano, M., et al.: ESACS: An integrated methodology for design and safety analysis of complex systems. In: ESREL (2003)"},{"key":"21_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/3-540-45804-2_6","volume-title":"Interactive Markov Chains","year":"2002","unstructured":"Hermanns, H. (ed.): Interactive Markov Chains. LNCS, vol.\u00a02428, p. 129. Springer, Heidelberg (2002)"},{"issue":"1","key":"21_CR20","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.tcs.2005.07.022","volume":"345","author":"C. Baier","year":"2005","unstructured":"Baier, C., et al.: Efficient computation of time-bounded reachability probabilities in uniform continuous-time markov decision processes. Theor. Comput. Sci.\u00a0345(1), 2\u201326 (2005)","journal-title":"Theor. Comput. Sci."},{"key":"21_CR21","unstructured":"Herbstritt, M., Wimmer, R., Peikenkamp, T., B\u00f6de, E., Hermanns, H., Adelaide, M., Becker, B.: Analysis of Large Safety-Critical Systems: A quantitative approach. Reports of SFB\/TR 14 AVACS\u00a08 (2006), \n                    \n                      http:\/\/www.avacs.org\n                    \n                    \n                   ISSN: 1860-9821"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11875567_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:24:59Z","timestamp":1619493899000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11875567_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540457626","9783540457633"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/11875567_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}