{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T22:51:59Z","timestamp":1725663119603},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540151999"},{"type":"electronic","value":"9783540393078"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1985]]},"DOI":"10.1007\/3-540-15199-0_22","type":"book-chapter","created":{"date-parts":[[2012,2,25]],"date-time":"2012-02-25T18:12:33Z","timestamp":1330193553000},"page":"339-355","source":"Crossref","is-referenced-by-count":10,"title":["Analyzing safety and fault tolerance using Time Petri nets"],"prefix":"10.1007","author":[{"given":"N. G.","family":"Leveson","sequence":"first","affiliation":[]},{"given":"J. L.","family":"Stolzy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,5,28]]},"reference":[{"key":"22_CR1","unstructured":"Azema, P., and Diaz, M. \u201cChecking Experiments for Concurrent Systems,\u201d FTCS-7, June 1977, p. 206."},{"key":"22_CR2","volume-title":"System Safety: Technology and Application","author":"S. W. Malasky","year":"1982","unstructured":"Malasky, S.W. System Safety: Technology and Application, Garland STPM Press, New York, 1982."},{"key":"22_CR3","unstructured":"Kopetz, H. \u201cThe Failure Fault (FF) Model,\u201d FTCS-12, Santa Monica, Calif., June 1982, pp. 14\u201317."},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Leveson, N.G. and Harvey, P.R. \u201cAnalyzing Software Safety,\u201d IEEE Transactions on Software Engineering, vol. SE-9, no. 5, Sept. 1983.","DOI":"10.1109\/TSE.1983.235116"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Leveson, N.G. \u201cSoftware Safety in Process-Control Systems,\u201d IEEE Computer, February 1984.","DOI":"10.1109\/MC.1984.1659054"},{"key":"22_CR6","volume-title":"A Study of the Recoverability of Computing Systems","author":"P. M. Merlin","year":"1974","unstructured":"Merlin, P.M. \u201cA Study of the Recoverability of Computing Systems,\u201d Ph.D. Thesis, Information and Computer Science Department, University of California, Irvine, 1974."},{"issue":"9","key":"22_CR7","doi-asserted-by":"crossref","first-page":"1036","DOI":"10.1109\/TCOM.1976.1093424","volume":"COM-24","author":"P. M. Merlin","year":"1976","unstructured":"Merlin, P.M. and Farber, D.J. \u201cRecoverability of Communication Protocols \u2014 Implications of a Theoretical Study,\u201d IEEE Transactions on Communications, vol. COM-24, no. 9, September 1976, pp. 1036\u20131043.","journal-title":"IEEE Transactions on Communications"},{"key":"22_CR8","unstructured":"MIL-STD-882b, System Safety Program Requirements, U.S. Department of Defense, April 1984."},{"key":"22_CR9","unstructured":"Peterson, J.L. Petri Net Theory and the Modeling of Systems, Prentice Hall, 1981."},{"key":"22_CR10","unstructured":"Vesely, W.E., Goldberg, F.F., Roberts, N.H., and Haasl, D.F. Fault Tree Handbook, NUREG-0492, U.S. Nuclear Regulatory Commission, January 1981."}],"container-title":["Lecture Notes in Computer Science","Formal Methods and Software Development"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-15199-0_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:08:10Z","timestamp":1605643690000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-15199-0_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1985]]},"ISBN":["9783540151999","9783540393078"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-15199-0_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1985]]}}}