{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,19]],"date-time":"2025-01-19T21:10:17Z","timestamp":1737321017600,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540426073"},{"type":"electronic","value":"9783540454168"}],"license":[{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45416-0_12","type":"book-chapter","created":{"date-parts":[[2007,7,20]],"date-time":"2007-07-20T19:29:50Z","timestamp":1184959790000},"page":"109-118","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Experimental Evaluation of Fault Handling Mechanisms"],"prefix":"10.1007","author":[{"given":"Piotr","family":"Gawkowski","sequence":"first","affiliation":[]},{"given":"Janusz","family":"Sosnowski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,9,26]]},"reference":[{"issue":"6","key":"12_CR1","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1109\/71.774911","volume":"10","author":"Z. Alkhalifa","year":"1999","unstructured":"Alkhalifa, Z., Nair, V. S. S., Kirshnamurthy, N., Abraham, J. A.: Design and Evaluation of System-Level Checks for On-Line Control Flow Error Detection, IEEE Transactions on Parallel and Distributed Systems, Vol. 10, No. 6, June 1999, pp. 627\u2013641","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"12_CR2","unstructured":"Benso, A., Chiusano, S., Prinetto, P.: A Software Development Kit for Dependable Applications in Embedded Systems, Proc. of IEEE Int. Test Conference, 2000"},{"key":"12_CR3","unstructured":"Bondavalli, A., et al.: Threshold Based Mechanisms to Discriminate Transient from Intermittent Faults, IEI:B4-17-06-98, IEI-Pisa"},{"issue":"2","key":"12_CR4","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/32.666826","volume":"24","author":"J. Carreira","year":"1998","unstructured":"Carreira, J., Madeira, H., Silva, J.G.: Xception: A Technique of The Experimental Evaluation of Dependability in Modern Computers, IEEE Transactions on Software Engineering, vol.24, No.2, February 1998, pp.125\u2013136","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"7","key":"12_CR5","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1109\/12.780878","volume":"48","author":"M. Cukier","year":"1999","unstructured":"Cukier, M., Powell, D., Arlat, J.: Coverage Estimation Methods for Stratified Fault Injection, IEEE Transactions on Computers, vol. 48, No. 7, July 1999, pp. 707\u2013723","journal-title":"IEEE Transactions on Computers"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Folkesson, P., Karlsson, J.: Considering Workload Input Variations in Error Coverage Estimation, Proc. of 3rd European Dependable Computing Conference, Springer, 1999, pp.171\u2013188","DOI":"10.1007\/3-540-48254-7_13"},{"key":"12_CR7","unstructured":"Lyu, M. R.: Software Fault Tolerance, John Wiley, 1995"},{"key":"12_CR8","first-page":"183","volume":"5","author":"L. D. McFearin","year":"1998","unstructured":"McFearin, Lee D., Nair, V. S. S.: Control Flow Checking Using Assertions, Dependable Computing for Critical Applications 5 (DCCA-5), IEEE Computer Society 1998, pp. 183\u2013200","journal-title":"Dependable Computing for Critical Applications"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Napier, J., May, J., Hughes, G.: Empirical Assessment of Software On-Line Diagnostics Using Fault Injection, Proc. of SAFECOMP2000, pp.14\u201326","DOI":"10.1007\/3-540-40891-6_2"},{"key":"12_CR10","unstructured":"Pradhan, D. K.: Fault Tolerant Computer Systems, Prentice Hall 1996"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Rebaudengo, M., Sonza Reorda, M., et al.: An Experimental Evaluation of the Effectiveness of Automatic Rule-Based Transformations for Safety-Critical Applications, DFT\u2019 2000: IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, 2000, pp. 257\u2013265","DOI":"10.1109\/DFTVS.2000.887164"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Sosnowski, J.: Transient Fault Tolerance in Digital Systems, IEEE Micro, February 1994, pp.24\u201335","DOI":"10.1109\/40.259897"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Sosnowski, J., Gawkowski, P.: Tracing Fault Effects in System Environment, Proceedings of Euromicro Conference, IEEE Comp. Soc. 1999, pp.481\u2013486","DOI":"10.1109\/EURMIC.1999.794514"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45416-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,19]],"date-time":"2025-01-19T20:51:01Z","timestamp":1737319861000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45416-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540426073","9783540454168"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-45416-0_12","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]},"assertion":[{"value":"26 September 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}