{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:46:30Z","timestamp":1725551190636},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540664888"},{"type":"electronic","value":"9783540482499"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48249-0_20","type":"book-chapter","created":{"date-parts":[[2010,3,29]],"date-time":"2010-03-29T21:13:11Z","timestamp":1269897191000},"page":"226-238","source":"Crossref","is-referenced-by-count":5,"title":["Safety Verification of ADA95 Programs Using Software Fault Trees"],"prefix":"10.1007","author":[{"given":"Sang-Yoon","family":"Min","sequence":"first","affiliation":[]},{"given":"Yoon-Kyu","family":"Jang","sequence":"additional","affiliation":[]},{"given":"Sung-Deok","family":"Cha","sequence":"additional","affiliation":[]},{"given":"Yong-Rae","family":"Kwon","sequence":"additional","affiliation":[]},{"given":"Doo-Hwan","family":"Bae","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,10,14]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Nancy G. Leveson, Stephen S. Cha, and Timothy J. Shimeall, \u201cSafety Verification of Ada Programs Using Software Fault Trees,\u201d IEEE Software, July 1991, pp. 48\u201359.","DOI":"10.1109\/52.300036"},{"key":"20_CR2","unstructured":"Ada95 Rationale, Intermetrics, 1995."},{"key":"20_CR3","unstructured":"ADA83 LRM, ANSI\/MIL-STD-1815A-1983, DOD, 1983."},{"key":"20_CR4","unstructured":"ADA95 LRM, ISO\/IEC 8652:1995(E), Intermetrics 1995."},{"key":"20_CR5","unstructured":"Grady Booch, Doug Bryan, and Charles G. Petersen, Software Engineering with Ada, The Benjamin\/Cummings Publishing Company, Inc., 1994."},{"key":"20_CR6","unstructured":"Michael B. Feldman and Elliot B. Koffman, Ada95 Problem Solving and Program Design, Addison-Wesley, 1996."}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48249-0_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T18:59:59Z","timestamp":1558983599000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48249-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540664888","9783540482499"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/3-540-48249-0_20","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]}}}