{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:37:32Z","timestamp":1725489452305},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540411192"},{"type":"electronic","value":"9783540399674"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-39967-4_32","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T04:15:34Z","timestamp":1187237734000},"page":"419-434","source":"Crossref","is-referenced-by-count":0,"title":["Certifying KBSs: Using CommonKADS to Provide Supporting Evidence for Fitness for Purpose of KBSs"],"prefix":"10.1007","author":[{"given":"Kieron","family":"O\u2019Hara","sequence":"first","affiliation":[]},{"given":"Nigel","family":"Shadbolt","sequence":"additional","affiliation":[]},{"given":"Jeni","family":"Tennison","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,7,2]]},"reference":[{"key":"32_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39967-4_3","volume-title":"Knowledge Engineering and Management: The CommonKADS Methodology","author":"G. Schreiber","year":"2000","unstructured":"Schreiber, G., Akkermans, H., Anjewierden, A., de Hoog, R., Shadbolt, N., Van de Velde, W. & Wielinga, B. Knowledge Engineering and Management: The CommonKADS Methodology, M.I.T. Press, Cambridge, Mass (2000)"},{"key":"32_CR2","unstructured":"IEC Pub 880. International Electrotechnical Commission, Software for Computers in the Safety Systems of Nuclear Power Stations, Geneva (1986)"},{"key":"32_CR3","unstructured":"IEC 1508. International Electrotechnical Commission, Draft International Standard 1508: Functional Safety: Safety-Related Systems, Geneva (1995)"},{"key":"32_CR4","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1006\/ijhc.1999.0327","volume":"51","author":"N. Shadbolt","year":"1999","unstructured":"Shadbolt, N., O\u2019Hara, K. & Crow, L. The experimental evaluation of knowledge acquisition techniques and methods: history, problems and new directions, in International Journal of Human-Computer Studies, 51 (1999), 729\u2013755","journal-title":"International Journal of Human-Computer Studies"},{"key":"32_CR5","first-page":"315","volume-title":"Expertise in Context","author":"N. Shadbolt","year":"1997","unstructured":"Shadbolt, N. & O\u2019Hara, K. Model-based expert systems and explanations of expertise, in P.J. Feltovich, K.M. Ford & R.R. Hoffman (eds.) Expertise in Context, AAAI Press\/MIT Press, Menlo Park, CA (1997), 315\u2013337"},{"key":"32_CR6","unstructured":"Terpstra, P., van Heijst, G., Nordbo, I, Ramparany, F., Reichgelt, H., Shadbolt, N. & Wielinga, B.. KA Process Support in KEW, ACKnowledge deliverable ACK-UVA-A2-DEL-002-A, University of Amsterdam (1992)"},{"key":"32_CR7","unstructured":"Preece, A. Building the right system right: evaluating V&V methods in knowledge engineering, in Proceedings of the 11th Banff Knowledge Acquisition for Knowledge Based Systems Workshop, Banff, Canada (1998)"},{"key":"32_CR8","unstructured":"Benini, M., Dondossola, G., Guida, G. & Lamperti, G. Safe-KBS Life-Cycle Model Description Document, SafeKBS\/TR3.2-a (1997)"},{"key":"32_CR9","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1002\/int.4550090804","volume":"9","author":"A. Preece","year":"1994","unstructured":"Preece, A. & Shinghal, R. Foundation and application of knowledge base verification, in International Journal of Intelligent Systems, 9 (1994), 683\u2013702","journal-title":"International Journal of Intelligent Systems"},{"key":"32_CR10","doi-asserted-by":"crossref","unstructured":"Meseguer, P. & Preece, A. Assessing the role of formal specifications in verification and validation of knowledge-based systems, in Proceedings of the 3rd IFIP International Conference on \u201cAchieving Quality in Software\u201d (AQuIS\u201996), Chapman and Hall (1996), 317\u2013328","DOI":"10.1007\/978-0-387-34869-8_26"},{"key":"32_CR11","unstructured":"Leveson, N.G. Safeware: System Safety and Computers, Addison-Wesley (1995)"},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"Reese, J.D. Software Deviation Analysis, Ph.D. thesis, University of California, Irvine (1996)","DOI":"10.1145\/253228.253281"},{"key":"32_CR13","unstructured":"Menzies, T. Evaluation issues with critical success metrics, in Proceedings of the 11th Banff Knowledge Acquisition for Knowledge Based Systems Workshop, Banff, Canada (1998)"},{"key":"32_CR14","unstructured":"Compton, P., Preston, P., Edwards, G. & Kang, B. Knowledge based systems that have some idea of their limits, in Proceedings of the 10th Banff Knowledge Acquisition for Knowledge Based Systems Workshop, Banff, Canada (1996)"},{"key":"32_CR15","doi-asserted-by":"crossref","unstructured":"Beydoun, G. & Hoffman, A. Simultaneous modelling and knowledge acquisition using NRDR, in Proceedings of the 5th Pacific Rim Conference on Artificial Intelligence (PRICAI 98), Springer-Verlag (1998), 83\u201395","DOI":"10.1007\/BFb0095260"}],"container-title":["Lecture Notes in Computer Science","Knowledge Engineering and Knowledge Management Methods, Models, and Tools"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-39967-4_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T00:15:55Z","timestamp":1556756155000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-39967-4_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540411192","9783540399674"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-39967-4_32","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}