{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:46:15Z","timestamp":1725551175397},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540664888"},{"type":"electronic","value":"9783540482499"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48249-0_6","type":"book-chapter","created":{"date-parts":[[2010,3,29]],"date-time":"2010-03-29T17:13:11Z","timestamp":1269882791000},"page":"58-66","source":"Crossref","is-referenced-by-count":2,"title":["Safety Analysis Techniques for Validating Formal Models during Verification"],"prefix":"10.1007","author":[{"given":"Rog\u00e9rio","family":"de Lemos","sequence":"first","affiliation":[]},{"given":"Amer","family":"Saeed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,10,14]]},"reference":[{"key":"6_CR1","first-page":"281","volume-title":"Proceedings of the 16th International Conference on Computer Safety, Reliability and Security (SAFECOMP\u201997)","author":"M. Cepin","year":"1997","unstructured":"M. Cepin, R. de Lemos, B. Mavko, S. Riddle, A. Saeed. \u201cAn Object-Based Approach to Modelling and Analysis of Failure Properties\u201d. Proceedings of the 16th International Conference on Computer Safety, Reliability and Security (SAFECOMP\u201997). York, UK. September 1997. Ed. P. Daniel. Springer-Verlag. Berlin, Germany. pp. 281\u2013294."},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"E. Clarke, O. Grumberg, and D. Long. \u201cModel Checking and Abstraction\u201d. ACM Transactions on Programming Languages and Systems (TOPLAS) Vol. 15(5). ACM. September, 1994.","DOI":"10.1145\/186025.186051"},{"issue":"7","key":"6_CR3","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1109\/32.708566","volume":"27","author":"W. Chan","year":"1998","unstructured":"W. Chan, et. al. \u201cModel Checking Large Software Specifications\u201d. IEEE Transactions on Software Engineering Vol. 27(7). IEEE Computer Society. July 1998. pp. 498\u2013520.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"6_CR4","series-title":"Technical Report","volume-title":"On the Integration of Requirements Analysis and Safety Analysis for Safety-Critical Software","author":"R. Lemos de","year":"1998","unstructured":"R. de Lemos, A. Saeed, and T. Anderson. On the Integration of Requirements Analysis and Safety Analysis for Safety-Critical Software. Technical Report Series No. 630. Department of Computing Science, University of Newcastle upon Tyne, UK. May, 1998."},{"key":"6_CR5","series-title":"Technical Report","volume-title":"Validating Formal Verification using Safety Analysis Techniques","author":"R. Lemos de","year":"1999","unstructured":"R. de Lemos, and A. Saeed. Validating Formal Verification using Safety Analysis Techniques. Technical Report Series No. 668.. Department of Computing Science, University of Newcastle upon Tyne, UK. May, 1999."},{"issue":"11","key":"6_CR6","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1109\/32.730543","volume":"27","author":"C. Heitmeyer","year":"1998","unstructured":"C. Heitmeyer, et. al. \u201cUsing Abstraction and Model Checking to Detect Safety Violations in Requirements Specifications\u201d. IEEE Transactions on Software Engineering Vol. 27(11). IEEE Computer Society. November 1998. pp. 927\u2013948.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"6_CR7","unstructured":"K. L. Heninger, J. Kallander, D. L. Parnas and J. E. Shore. Software Requirements for the A-7E Aircraft. NRL Memorandum Report 3876. November 1978."},{"issue":"1","key":"6_CR8","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TSE.1980.230208","volume":"SE-6","author":"K. L. Heninger","year":"1980","unstructured":"K. L. Heninger. \u201cSpecifying Software Requirements for Complex Systems: New Techniques and their Applications\u201d. IEEE Transactions on Software Engineering Vol. SE-6 (1). January 1980. pp 2\u201313.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"6_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1007\/3-540-60045-0_53","volume-title":"Proceedings of the Computer-Aided Verification (CAV\u201995)","author":"T. A. Henzinger","year":"1995","unstructured":"T. A. Henzinger, and P.-H. Ho. \u201cAlgorithmic Analysis of Non-Linear Hybrid Systems\u201d. Proceedings of the Computer-Aided Verification (CAV\u201995). LNCS 939. Springer-Verlag. Berlin, Germany. pp. 225\u2013238."},{"key":"6_CR10","series-title":"Lect Notes Comput Sci","first-page":"264","volume-title":"Hybrid Systems II","author":"T. A. Henzinger","year":"1995","unstructured":"T. A. Henzinger, and P.-H. Ho. \u201cHYTECH: The Cornell HYbrid TECHnology Tool\u201d. Hybrid Systems II. Lecture Notes in Computer Science 999. Eds. P. Antsaklis, et. al. Springer-Verlag, Germany. 1995. pp. 264\u2013293."},{"key":"6_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/BFb0014722","volume-title":"Hybrid and Real-Time Systems","author":"T. Stauner","year":"1997","unstructured":"T. Stauner, O. M\u00fcller, and M. Fuchs. \u201cUsing HYTECH to Verify an Automative Control System\u201d. Hybrid and Real-Time Systems. Ed. O. Maler. LNCS 1201. Springer-Verlag. Berlin, Germany. 1997. pp. 139\u2013153."},{"key":"6_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/BFb0014731","volume-title":"Proceedings of the International Workshop on Hybrid and Real-Time Systems","author":"A. L. Turk","year":"1997","unstructured":"A. L. Turk, S. T. Probst, and G. J. Powers. \u201cVerification of Real Time Chemical Processing Systems\u201d. Proceedings of the International Workshop on Hybrid and Real-Time Systems. Lecture Notes in Computer Science 1201. Ed. O. Maler. Grenoble, France. March 1997. pp. 257\u2013272."}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48249-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T14:53:01Z","timestamp":1558968781000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48249-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540664888","9783540482499"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-48249-0_6","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]}}}