{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T14:10:42Z","timestamp":1761487842243},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540411864"},{"type":"electronic","value":"9783540408918"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-40891-6_23","type":"book-chapter","created":{"date-parts":[[2007,5,26]],"date-time":"2007-05-26T20:01:38Z","timestamp":1180209698000},"page":"264-274","source":"Crossref","is-referenced-by-count":3,"title":["An Approach to Software Assisted Recovery from Hardware Transient Faults for Real Time Systems"],"prefix":"10.1007","author":[{"given":"D.","family":"Basu","sequence":"first","affiliation":[]},{"given":"R.","family":"Paramasivam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,6,1]]},"reference":[{"issue":"3","key":"23_CR1","first-page":"355","volume":"SE-9","author":"T. Anderson","year":"1983","unstructured":"Thomas Anderson and John C. Knight: A Framework for Software Fault Tolerance in Real Time Systems, IEEE Trans. Software Eng., Vol. SE-9, No.3, (1983), 355\u2013364.","journal-title":"A Framework for Software Fault Tolerance in Real Time Systems"},{"issue":"5","key":"23_CR2","first-page":"626","volume":"38","author":"K.H. Kim","year":"1989","unstructured":"K.H. Kim and Howard O. Welch: Distributed Execution of Recovery Blocks: An Approach for Uniform Treatment of Hardware and Software Faults in Real Time Applications, IEEE Trans. Computers, Vol. 38, No.5, (1989), 626\u2013636.","journal-title":"An Approach for Uniform Treatment of Hardware and Software Faults in Real Time Applications"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Jaynarayan H. Lala and Richard E. Harper: Architectural Principles for Safety\u2014 Critical Real Time Applications, Proceedings of the IEEE, Vol. 82, No. 1, (1994), 25\u201340.","DOI":"10.1109\/5.259424"},{"issue":"7","key":"23_CR4","doi-asserted-by":"publisher","first-page":"906","DOI":"10.1109\/12.55692","volume":"39","author":"K. Kant","year":"1990","unstructured":"Krishna Kant: Performance Analysis of Real Time Software Supporting Fault-Tolerant Operation, IEEE Trans. Computers, Vol. 39, No. 7, (1990), 906\u2013918.","journal-title":"IEEE Trans. Computers"},{"issue":"12","key":"23_CR5","doi-asserted-by":"publisher","first-page":"1491","DOI":"10.1109\/TSE.1985.231893","volume":"SE-11","author":"A. Avizienis","year":"1985","unstructured":"A. Avizienis: The N-Version Approach to Fault-Tolerant Software, IEEE Trans. Software Eng., Vol. SE-11, No. 12, (1985), 1491\u20131501.","journal-title":"IEEE Trans. Software Eng."},{"issue":"2","key":"23_CR6","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1109\/TSE.1975.6312842","volume":"SE-1","author":"B. Randell","year":"1975","unstructured":"Brian Randell: System Structure for Software Fault Tolerance, IEEE Trans. Software Eng., Vol. SE-1, No. 2, (1975), 220\u2013232.","journal-title":"IEEE Trans. Software Eng."},{"issue":"1","key":"23_CR7","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/32.210308","volume":"SE-19","author":"J. Xu","year":"1993","unstructured":"Jia Xu and David Lorge Parnas: On Satisfying Timing Constraints in Hard-Real Time Systems, IEEE Trans. Software Eng., Vol. SE-19, No. 1, (1993), 70\u201384.","journal-title":"IEEE Trans. Software Eng."},{"key":"23_CR8","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1145\/321738.321743","volume":"20","author":"C.L. Liu","year":"1973","unstructured":"C.L. Liu and J.W. Layland: Scheduling Algorithms for Multiprogramming in a Hard Real Time Environment, J. Ass. Comput. Mach., Vol. 20, (1973), 46\u201361.","journal-title":"J. Ass. Comput. Mach."},{"key":"23_CR9","unstructured":"Gerry Kane, Doug Hawkins, Lance Leventhal: 68000 Assembly Language Programming, OSBORNE\/McGraw Hill, (1986)."}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-40891-6_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,16]],"date-time":"2019-02-16T18:53:01Z","timestamp":1550343181000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-40891-6_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540411864","9783540408918"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-40891-6_23","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}