{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:53:34Z","timestamp":1743044014123,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030198060"},{"type":"electronic","value":"9783030198077"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-19807-7_17","type":"book-chapter","created":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T13:24:51Z","timestamp":1557235491000},"page":"170-179","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Empirical Assessment of Error Masking Semantic Metric"],"prefix":"10.1007","author":[{"given":"Dalila","family":"Amara","sequence":"first","affiliation":[]},{"given":"Latifa","family":"Rabai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,8]]},"reference":[{"key":"17_CR1","doi-asserted-by":"publisher","DOI":"10.1201\/b17461","volume-title":"Software metrics: a rigorous and practical approach","author":"N Fenton","year":"2014","unstructured":"Fenton, N., Bieman, J.: Software metrics: a rigorous and practical approach. CRC Press, Boca Raton (2014)"},{"key":"17_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-7091-9170-5_1","volume-title":"Dependability: Basic Concepts and Terminology","author":"J. C. Laprie","year":"1992","unstructured":"Laprie, J.C.: Dependability: basic concepts and terminology. In: Dependability: Basic Concepts and Terminology, pp. 3\u2013245. Springer, Vienna (1992)"},{"key":"17_CR3","volume-title":"Software Testing: Concepts and Operations","author":"A Mili","year":"2015","unstructured":"Mili, A., Tchier, F.: Software Testing: Concepts and Operations. Wiley, Hoboken (2015)"},{"issue":"3","key":"17_CR4","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/s11334-014-0233-3","volume":"10","author":"A Mili","year":"2014","unstructured":"Mili, A., Jaoua, A., Frias, M., Helali, R.G.M.: Semantic metrics for software products. Innov. Syst. Software Eng. 10(3), 203\u2013217 (2014)","journal-title":"Innov. Syst. Software Eng."},{"key":"17_CR5","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-1-4614-2113-9","volume-title":"Fault-Tolerant Design","author":"E Dubrova","year":"2013","unstructured":"Dubrova, E.: Fault-Tolerant Design, pp. 55\u201365. Springer, New York (2013)"},{"key":"17_CR6","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-7091-8990-0_3","volume-title":"Fault Tolerance","author":"Peter Alan Lee","year":"1990","unstructured":"Lee, P.A., Anderson, T.: Fault tolerance. In: Fault Tolerance, pp. 51\u201377. Springer, Vienna (1990). \n                  https:\/\/doi.org\/10.1007\/978-3-7091-8990-0_3"},{"key":"17_CR7","volume-title":"Software Fault Tolerance Techniques and Implementation","author":"LL Pullum","year":"2001","unstructured":"Pullum, L.L.: Software Fault Tolerance Techniques and Implementation. Artech House, Norwood (2001)"},{"unstructured":"Lyu, M.R.: Handbook of software reliability engineering (1996)","key":"17_CR8"},{"key":"17_CR9","first-page":"262","volume-title":"Advances in Intelligent Systems and Computing","author":"Dalila Amara","year":"2018","unstructured":"Amara, D., Fatnassi, E., Rabai, L.: An automated support tool to compute state redundancy semantic metric. In: International Conference on Intelligent Systems Design and Applications, pp. 262\u2013272. Springer, Cham, December 2017"},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1109\/TSE.1975.6312842","volume":"2","author":"B Randell","year":"1975","unstructured":"Randell, B.: System structure for software fault tolerance. IEEE Trans. Software Eng. 2, 220\u2013232 (1975)","journal-title":"IEEE Trans. Software Eng."},{"issue":"1","key":"17_CR11","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable Secure Comput. 1(1), 11\u201333 (2004)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"doi-asserted-by":"crossref","unstructured":"Rizwan, M., Nadeem, A., Khan, M.B.: An evaluation of software fault tolerance techniques for optimality. In: 2015 International Conference on Emerging Technologies (ICET), pp. 1\u20136. IEEE, December 2015","key":"17_CR12","DOI":"10.1109\/ICET.2015.7389208"},{"key":"17_CR13","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1109\/TSE.1987.233463","volume":"5","author":"RK Scott","year":"1987","unstructured":"Scott, R.K., Gault, J.W., McAllister, D.F.: Fault-tolerant software reliability modeling. IEEE Trans. Software Eng. 5, 582\u2013592 (1987)","journal-title":"IEEE Trans. Software Eng."},{"unstructured":"Lyu, M.R., Huang, Z., Sze, S.K., Cai, X.: An empirical study on testing and fault tolerance for software reliability engineering. In: 14th International Symposium on Software Reliability Engineering. ISSRE 2003, pp. 119\u2013130. IEEE, November 2003","key":"17_CR14"},{"key":"17_CR15","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.future.2018.04.049","volume":"87","author":"SA Asghari","year":"2018","unstructured":"Asghari, S.A., Marvasti, M.B., Rahmani, A.M.: Enhancing transient fault tolerance in embedded systems through an OS task level redundancy approach. Future Gener. Comput. Syst. 87, 58\u201365 (2018)","journal-title":"Future Gener. Comput. Syst."},{"doi-asserted-by":"crossref","unstructured":"Carzaniga, A., Mattavelli, A., Pezz, M.: Measuring software redundancy. In: Proceedings of the 37th International Conference on Software Engineering, vol. 1, pp. 156\u2013166. IEEE Press, May 2015","key":"17_CR16","DOI":"10.1109\/ICSE.2015.37"},{"issue":"2","key":"17_CR17","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1002\/j.1538-7305.1950.tb00463.x","volume":"29","author":"RW Hamming","year":"1950","unstructured":"Hamming, R.W.: Error detecting and error correcting codes. Bell Syst. Tech. J. 29(2), 147\u2013160 (1950)","journal-title":"Bell Syst. Tech. J."},{"issue":"1","key":"17_CR18","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/584091.584093","volume":"5","author":"CE Shannon","year":"2001","unstructured":"Shannon, C.E.: A mathematical theory of communication. ACM SIGMOBILE Mob. Comput. Commun. Rev. 5(1), 3\u201355 (2001)","journal-title":"ACM SIGMOBILE Mob. Comput. Commun. Rev."},{"key":"17_CR19","doi-asserted-by":"publisher","first-page":"1491","DOI":"10.1109\/TSE.1985.231893","volume":"12","author":"A Avizienis","year":"1985","unstructured":"Avizienis, A.: The N-version approach to fault-tolerant software. IEEE Trans. Software Eng. 12, 1491\u20131501 (1985)","journal-title":"IEEE Trans. Software Eng."},{"issue":"7","key":"17_CR20","doi-asserted-by":"publisher","first-page":"692","DOI":"10.1109\/32.83905","volume":"17","author":"DE Eckhardt","year":"1991","unstructured":"Eckhardt, D.E., Caglayan, A.K., Knight, J.C., Lee, L.D., McAllister, D.F., Vouk, M.A., Kelly, J.P.J.: An experimental evaluation of software redundancy as a strategy for improving reliability. IEEE Trans. Software Eng. 17(7), 692\u2013702 (1991)","journal-title":"IEEE Trans. Software Eng."},{"doi-asserted-by":"publisher","unstructured":"Jiang, L., Su, Z.: Automatic mining of functionally equivalent code fragments via random testing. In: Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, pp. 81\u201392. ACM, July 2009. \n                  https:\/\/doi.org\/10.1145\/1572272.1572283","key":"17_CR21","DOI":"10.1145\/1572272.1572283"},{"issue":"2","key":"17_CR22","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1080\/10629360600678310","volume":"77","author":"B Yazici","year":"2007","unstructured":"Yazici, B., Yolacan, S.: A comparison of various tests of normality. J. Stat. Comput. Simul. 77(2), 175\u2013183 (2007). \n                  https:\/\/doi.org\/10.1080\/10629360600678310","journal-title":"J. Stat. Comput. Simul."},{"issue":"1","key":"17_CR23","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1080\/02664760600994539","volume":"34","author":"T Thadewald","year":"2007","unstructured":"Thadewald, T., Bning, H.: JarqueBera test and its competitors for testing normalitya power comparison. J. Appl. Stat. 34(1), 87\u2013105 (2007). \n                  https:\/\/doi.org\/10.1080\/02664760600994539","journal-title":"J. Appl. Stat."},{"issue":"4","key":"17_CR24","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/s10664-005-3861-2","volume":"10","author":"H Do","year":"2005","unstructured":"Do, H., Elbaum, S., Rothermel, G.: Supporting controlled experimentation with testing techniques: an infrastructure and its potential impact. Empirical Software Eng. 10(4), 405\u2013435 (2005)","journal-title":"Empirical Software Eng."},{"key":"17_CR25","volume-title":"A New View of Statistics","author":"WG Hopkins","year":"1997","unstructured":"Hopkins, W.G.: A New View of Statistics. Will G Hopkins, Melbourne (1997)"}],"container-title":["Advances in Intelligent Systems and Computing","Software Engineering Methods in Intelligent Algorithms"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-19807-7_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T04:08:41Z","timestamp":1558152521000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-19807-7_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030198060","9783030198077"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-19807-7_17","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"8 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSOC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Computer Science On-line Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zlin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Czech Republic","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 April 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 April 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"csolc2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/csoc.openpublish.eu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}