{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:57:41Z","timestamp":1760029061955},"publisher-location":"London","reference-count":11,"publisher":"Springer London","isbn-type":[{"type":"print","value":"9783540199625"},{"type":"electronic","value":"9781447130543"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/978-1-4471-3054-3_5","type":"book-chapter","created":{"date-parts":[[2013,4,8]],"date-time":"2013-04-08T23:33:23Z","timestamp":1365464003000},"page":"59-72","source":"Crossref","is-referenced-by-count":5,"title":["An Automated Code-Based Fault-Tree Mitigation Technique"],"prefix":"10.1007","author":[{"given":"Jeffrey M.","family":"Voas","sequence":"first","affiliation":[]},{"given":"Keith W.","family":"Miller","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"publisher","first-page":"1036","DOI":"10.1109\/TCOM.1976.1093424","volume":"COM-24","author":"P Merlin","year":"1976","unstructured":"P. Merlin and D. Farber. Recoverability of Communication Protocol-Implications of a Theoretical Study. IEEE Transactions on Communications, COM-24:1036\u20131043, 1976","journal-title":"IEEE Transactions on Communications"},{"key":"5_CR2","volume-title":"Software Assessment: Reliability, Safety, Testability","author":"M Friedman","year":"1995","unstructured":"M. Friedman and J. Voas. Software Assessment: Reliability, Safety, Testability, to be published by John Wiley and Sons, New York, 1995"},{"key":"5_CR3","series-title":"NATO ASI Series","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-82014-4_3","volume-title":"Electronic Systems Effectiveness and Life Cycle Costing","author":"DJ Lawson","year":"1983","unstructured":"D. J. Lawson. Failure Mode, Effect, and Criticality Analysis. In J. K. Skwirzynski, editor, Electronic Systems Effectiveness and Life Cycle Costing, pages 55\u201374, NATO ASI Series, F3, SpringerVerlag, Heidelberg, 1983"},{"key":"5_CR4","first-page":"48","volume-title":"IEEE Software","author":"NG Leveson","year":"1991","unstructured":"N.G. Leveson, S. S. Cha and T. J. Shimeall. Safety Verification of ADA Programs Using Software Fault Trees. IEEE Software, pages 48\u201359, July 1991"},{"key":"5_CR5","volume-title":"NASA Software Safety Standard","author":"Nasa","year":"1994","unstructured":"Nasa. NASA Software Safety Standard. Office of Safety and Mission Assurance, June 1994. Interim Report 1740.13"},{"key":"5_CR6","unstructured":"T. J. Shimeall. Personal communications"},{"issue":"8","key":"5_CR7","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1109\/32.153381","volume":"18","author":"J Voas","year":"1992","unstructured":"J. Voas. PIE: A Dynamic Failure-Based Technique. IEEE Trans. on Software Engineering, 18(8):717\u2013727, August 1992","journal-title":"IEEE Trans. on Software Engineering"},{"key":"5_CR8","volume-title":"Safety Related Software","author":"Underwriters Laboratory Inc","year":"1994","unstructured":"Underwriters Laboratory Inc. Safety Related Software, January 1994. Standard for Safety UL1998, First Edition"},{"issue":"2","key":"5_CR9","first-page":"171","volume":"1","author":"J Voas","year":"1994","unstructured":"J.Voas and K. Miller. Dynamic Testability Analysis for Assessing Fault Tolerance. High Integrity Systems Journal, 1 (2): 171\u2013178, 1994","journal-title":"High Integrity Systems Journal"},{"key":"5_CR10","volume-title":"Proc. of Eighth Annual Conference on Computer Assurance","author":"J Voas","year":"1995","unstructured":"J. Voas and K. Miller. Examining Software Quality (Fault-tolerance) Using Unlikely Inputs: Turning the Test Distribution Up-side Down. In Proc. of Eighth Annual Conference on Computer Assurance., National Institute of Standards and Technology, Gaithersburg, MD, June 1995"},{"key":"5_CR11","volume-title":"Proc. of the International Symposium on Software Reliability Engineering","author":"J Voas","year":"1995","unstructured":"J. Voas and K. Miller. Predicting Software\u2019s Minimum-time-to-hazard and Mean-time-to-hazard for Rare Input Events. In Proc. of the International Symposium on Software Reliability Engineering, (Submitted) Toulouse France, October 1995"}],"container-title":["Safe Comp 95"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4471-3054-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T01:12:20Z","timestamp":1557623540000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4471-3054-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540199625","9781447130543"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-1-4471-3054-3_5","relation":{},"subject":[],"published":{"date-parts":[[1995]]}}}