{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T16:01:15Z","timestamp":1726848075155},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540503026"},{"type":"electronic","value":"9783540459651"}],"license":[{"start":{"date-parts":[[1988,1,1]],"date-time":"1988-01-01T00:00:00Z","timestamp":567993600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1988]]},"DOI":"10.1007\/3-540-50302-1_1","type":"book-chapter","created":{"date-parts":[[2012,2,25]],"date-time":"2012-02-25T15:19:30Z","timestamp":1330183170000},"page":"1-35","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["High integrity computing"],"prefix":"10.1007","author":[{"given":"WJ","family":"Cullyer","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2005,5,28]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"DANIELS B K Achieving safety and reliability with computer systems Elsevier Applied Science Series 1987","DOI":"10.1007\/978-94-009-3461-0"},{"key":"1_CR2","unstructured":"RTP MALPAS User Guide Rex, Thompson and Partners, Jan 1988"},{"key":"1_CR3","unstructured":"CARRE B A CLUTTERBUCK D SPADE static code analysis manual Program Validation Ltd, June 1987"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"GORDON M HOL A proof generating system for Higher Order Logic VLSI Specification, Verification and Synthesis Kluwer Academic Publishers, 1988","DOI":"10.1007\/978-1-4613-2007-4_3"},{"key":"1_CR5","unstructured":"MORISON J et al ELLA: Hardware description or specification Proceedings IEEE International Conf. CAD-84 Santa Clara, Nov 1984"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"CULLYER W J Implementing safety-critical systems: The VIPER microprocessor VLSI Specification, Verification and Synthesis Kluwer Academic Publishers, 1988","DOI":"10.1007\/978-1-4613-2007-4_1"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"HALBERT M P A self-checking computer module based on the VIPER microprocessor Achieving safety and reliability with computer systems Elsevier Applied Science Series 1987","DOI":"10.1007\/978-94-009-3461-0_21"},{"key":"1_CR8","unstructured":"SUFFRIN B Z Handbook, draft 1.1 Oxford Programming Research Group October 1985"},{"key":"1_CR9","unstructured":"JONES C B Systematic software development using VDM Prentice Hall 1986"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"COHN A A proof of correctness of the VIPER microprocessor: The first level VLSI Specification, Verification and Synthesis Kluwer Academic Publishers, 1988","DOI":"10.1007\/978-1-4613-2007-4_2"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"CULLYER W J Hardware Integrity Aeronautical Journal, Royal Aeronautical Society, Aug\/Sept 1985","DOI":"10.1017\/S0001924000014986"},{"key":"1_CR12","unstructured":"HSE Guidelines on the use of programmable electronic systems in safety related applications Health and Safety Executive June 1987"},{"key":"1_CR13","unstructured":"MOD Draft Defence Standard 00-55 Director Standardization MOD July 1988"},{"key":"1_CR14","unstructured":"CULLYER W J VIPER: Correspondence between Specification amd major state machine RSRE Report 86004, Jan 1986"},{"key":"1_CR15","unstructured":"COHN A GORDON M A mechanized proof of correctness of a simple counter University of Cambridge Computer Laboratory Technical Report No 94, July 1986"},{"key":"1_CR16","unstructured":"PYGOTT C H Formal proof of correspondence between the specification of a hardware module and its gate level implementation RSRE Report 85012, November 1985"},{"key":"1_CR17","unstructured":"PYGOTT C H NODEN: An engineering approach to hardware verification Proceedings IFIP Conference on The Fusion of Hardware Design and Verification, Glasgow, 4\u20136 July 1988"}],"container-title":["Lecture Notes in Computer Science","Formal Techniques in Real-Time and Fault-Tolerant Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-50302-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,20]],"date-time":"2023-06-20T13:53:34Z","timestamp":1687269214000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-50302-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1988]]},"ISBN":["9783540503026","9783540459651"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-50302-1_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1988]]},"assertion":[{"value":"28 May 2005","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}