{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:04:53Z","timestamp":1742911493156,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030602475"},{"type":"electronic","value":"9783030602482"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-60248-2_16","type":"book-chapter","created":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T09:03:14Z","timestamp":1601370194000},"page":"231-250","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Behavioral Fault Modelling and Analysis with BIP: A Wheel Brake System Case\u00a0Study"],"prefix":"10.1007","author":[{"given":"Xudong","family":"Tang","sequence":"first","affiliation":[]},{"given":"Qiang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Weikai","family":"Miao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,29]]},"reference":[{"key":"16_CR1","unstructured":"Uniform Distribution (Continuous). https:\/\/www.mathworks.com\/help\/stats\/uniform-distribution-continuous.html"},{"key":"16_CR2","unstructured":"Advisory Circulars (ACs) 25.1309-1A - System Design and Analysis (1988)"},{"key":"16_CR3","unstructured":"ARP4761 - Guidelines and methods for conducting the safety assessment process on civil airborne systems and equipment (1996)"},{"key":"16_CR4","unstructured":"ARP4754A - Guidelines for Development of Civil Aircraft and Systems (2010)"},{"key":"16_CR5","unstructured":"AIR6110 - Contiguous Aircraft\/System Development Process Example (2011)"},{"key":"16_CR6","unstructured":"Aerospace Structures: Society of Automotive Engineers, Architecture Analysis and Design Language (AADL), Annex E: Error Model Annex (Annex Volume 1), April 2011"},{"key":"16_CR7","unstructured":"Akerlund, O., et al.: ISAAC, a framework for integrated safety analysis of functional, geometrical and human aspects, January 2007"},{"key":"16_CR8","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MS.2011.27","volume":"28","author":"A Basu","year":"2011","unstructured":"Basu, A., et al.: Rigorous component-based system design using the BIP framework. IEEE Softw. 28, 41\u201348 (2011)","journal-title":"IEEE Softw."},{"key":"16_CR9","unstructured":"Basu, A., Bozga, M., Sifakis, J.: Modeling heterogeneous real-time components in BIP. In: Fourth IEEE International Conference on Software Engineering and Formal Methods (SEFM 2006), pp. 3\u201312 (2006)"},{"key":"16_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-25929-6_1","volume-title":"Mathematical and Engineering Methods in Computer Science","author":"A Basu","year":"2012","unstructured":"Basu, A., Bensalem, S., Bozga, M., Bourgos, P., Sifakis, J.: Rigorous system design: the BIP approach. In: Kot\u00e1sek, Z., Bouda, J., \u010cern\u00e1, I., Sekanina, L., Vojnar, T., Anto\u0161, D. (eds.) MEMICS 2011. LNCS, vol. 7119, pp. 1\u201319. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-25929-6_1"},{"key":"16_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/978-3-642-13464-7_4","volume-title":"Formal Techniques for Distributed Systems","author":"A Basu","year":"2010","unstructured":"Basu, A., Bensalem, S., Bozga, M., Caillaud, B., Delahaye, B., Legay, A.: Statistical abstraction and model-checking of large heterogeneous systems. In: Hatcliff, J., Zucca, E. (eds.) FMOODS\/FORTE -2010. LNCS, vol. 6117, pp. 32\u201346. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13464-7_4"},{"key":"16_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/978-3-642-16612-9_25","volume-title":"Runtime Verification","author":"A Basu","year":"2010","unstructured":"Basu, A., Bensalem, S., Bozga, M., Delahaye, B., Legay, A., Sifakis, E.: Verification of an AFDX infrastructure using simulations and probabilities. In: Barringer, H., et al. (eds.) RV 2010. LNCS, vol. 6418, pp. 330\u2013344. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-16612-9_25"},{"key":"16_CR13","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1145\/1755951.1755907","volume":"45","author":"M Biehl","year":"2010","unstructured":"Biehl, M., Chen, D.J., T\u00f6rngren, M.: Integrating safety analysis into the model-based development toolchain of automotive embedded systems. ACM SIGPLAN Not. 45, 125\u2013132 (2010)","journal-title":"ACM SIGPLAN Not."},{"key":"16_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-319-24953-7_25","volume-title":"Automated Technology for Verification and Analysis","author":"S Bliudze","year":"2015","unstructured":"Bliudze, S., et al.: Formal verification of infinite-state BIP models. In: Finkbeiner, B., Pu, G., Zhang, L. (eds.) ATVA 2015. LNCS, vol. 9364, pp. 326\u2013343. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24953-7_25"},{"key":"16_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1007\/978-3-319-21690-4_36","volume-title":"Computer Aided Verification","author":"M Bozzano","year":"2015","unstructured":"Bozzano, M., et al.: Formal design and safety analysis of AIR6110 wheel brake system. In: Kroening, D., P\u0103s\u0103reanu, C.S. (eds.) CAV 2015. LNCS, vol. 9206, pp. 518\u2013535. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21690-4_36"},{"key":"16_CR16","unstructured":"Bozzano, M., et al.: ESACS: an integrated methodology for design and safety analysis of complex systems, June 2003"},{"key":"16_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-319-64119-5_5","volume-title":"Model-Based Safety and Assessment","author":"J Brunel","year":"2017","unstructured":"Brunel, J., et al.: Performing safety analyses with AADL and AltaRica. In: Bozzano, M., Papadopoulos, Y. (eds.) IMBSA 2017. LNCS, vol. 10437, pp. 67\u201381. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-64119-5_5"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Delange, J., Feiler, P.: Architecture fault modeling with the AADL error-model annex. In: 2014 40th EUROMICRO Conference on Software Engineering and Advanced Applications, pp. 361\u2013368 (2014)","DOI":"10.1109\/SEAA.2014.20"},{"key":"16_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-3-642-40793-2_22","volume-title":"Computer Safety, Reliability, and Security","author":"B Ern","year":"2013","unstructured":"Ern, B., Nguyen, V.Y., Noll, T.: Characterization of failure effects on AADL models. In: Bitsch, F., Guiochet, J., Ka\u00e2niche, M. (eds.) SAFECOMP 2013. LNCS, vol. 8153, pp. 241\u2013252. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40793-2_22"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Feiler, P., Rugina, A.: Dependability modeling with the architecture analysis and design language (AADL), January 2007","DOI":"10.21236\/ADA455842"},{"key":"16_CR21","unstructured":"Haasl, D.F., Roberts, N.H., Vesely, W.E., Goldberg, F.F.: Fault Tree Handbook"},{"key":"16_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-540-24622-0_8","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"T H\u00e9rault","year":"2004","unstructured":"H\u00e9rault, T., Lassaigne, R., Magniette, F., Peyronnet, S.: Approximate probabilistic model checking. In: Steffen, B., Levi, G. (eds.) VMCAI 2004. LNCS, vol. 2937, pp. 73\u201384. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24622-0_8"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Joshi, A., Miller, S.P., Whalen, M., Heimdahl, M.P.E.: A proposal for model-based safety analysis. In: 24th Digital Avionics Systems Conference, vol. 2, pp. 13 (2005)","DOI":"10.1109\/DASC.2005.1563469"},{"key":"16_CR24","unstructured":"Konnov, I., Kotek, T., Wang, Q., Veith, H., Bliudze, S., Sifakis, J.: Parameterized systems in BIP: design and model checking. In: Proceedings of the 27th International Conference on Concurrency Theory (CONCUR 2016), pp. 30\u201331. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik (2016)"},{"key":"16_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-662-45231-8_10","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications","author":"KG Larsen","year":"2014","unstructured":"Larsen, K.G., Legay, A.: Statistical model checking past, present, and future. In: Margaria, T., Steffen, B. (eds.) ISoLA 2014. LNCS, vol. 8803, pp. 135\u2013142. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45231-8_10"},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"Lisagor, O., Kelly, T., Niu, R.: Model-based safety assessment: review of the discipline and its challenges. In: The Proceedings of 2011 9th International Conference on Reliability, Maintainability and Safety, pp. 625\u2013632 (2011)","DOI":"10.1109\/ICRMS.2011.5979344"},{"key":"16_CR27","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1002\/9780470745403.ch2","volume-title":"Rare Event Simulation using Monte Carlo Methods","author":"P L\u2019Ecuyer","year":"2009","unstructured":"L\u2019Ecuyer, P., Mandjes, M., Tuffin, B.: Rare Event Simulation using Monte Carlo Methods, pp. 17\u201338. Wiley, Hoboken (2009)"},{"key":"16_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1007\/978-3-030-01090-4_33","volume-title":"Automated Technology for Verification and Analysis","author":"BL Mediouni","year":"2018","unstructured":"Mediouni, B.L., Nouri, A., Bozga, M., Dellabani, M., Legay, A., Bensalem, S.: $$\\cal{S}$$BIP 2.0: statistical model checking stochastic real-time systems. In: Lahiri, S.K., Wang, C. (eds.) ATVA 2018. LNCS, vol. 11138, pp. 536\u2013542. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01090-4_33"},{"key":"16_CR29","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1016\/j.jss.2019.02.019","volume":"151","author":"Z Mian","year":"2019","unstructured":"Mian, Z., Bottaci, L., Papadopoulos, Y., Mahmud, N.: Model transformation for analyzing dependability of AADL model by using HiP-HOPS. J. Syst. Softw. 151, 258\u2013282 (2019)","journal-title":"J. Syst. Softw."},{"key":"16_CR30","unstructured":"Papadopoulos, Y., Maruhn, M.: Model-based synthesis of fault trees from Matlab-Simulink models, pp. 77\u201382, August 2001"},{"key":"16_CR31","doi-asserted-by":"crossref","unstructured":"Paulitsch, M., Reiger, R., Strigini, L., Bloomfield, R.: Evidence-based security in aerospace: from safety to security and back again, pp. 21\u201322, November 2012","DOI":"10.1109\/ISSREW.2012.37"},{"key":"16_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1007\/978-3-540-27813-9_16","volume-title":"Computer Aided Verification","author":"K Sen","year":"2004","unstructured":"Sen, K., Viswanathan, M., Agha, G.: Statistical model checking of black-box probabilistic systems. In: Alur, R., Peled, D.A. (eds.) CAV 2004. LNCS, vol. 3114, pp. 202\u2013215. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-27813-9_16"},{"issue":"2","key":"16_CR33","doi-asserted-by":"publisher","first-page":"212","DOI":"10.3390\/electronics8020212","volume":"8","author":"X Wei","year":"2019","unstructured":"Wei, X., Dong, Y., Sun, P., Xiao, M.: Safety analysis of AADL models for grid cyber-physical systems via model checking of stochastic games. Electronics 8(2), 212 (2019)","journal-title":"Electronics"},{"key":"16_CR34","unstructured":"Wei, X., Dong, Y., Yang, M., Hu, N., Ye, H.: Hazard analysis for AADL model, pp. 1\u201310, August 2014"},{"key":"16_CR35","unstructured":"Younes, H.: Planning and verification for stochastic processes with asynchronous events, pp. 1001\u20131002, January 2004"},{"key":"16_CR36","doi-asserted-by":"crossref","unstructured":"Zhang, T., Jiang, Y., Ye, J., Jing, C., Qu, H.: An AADL model-based safety analysis method for flight control software. In: 2014 International Conference on Computational Intelligence and Communication Networks, pp. 1148\u20131152 (2014)","DOI":"10.1109\/CICN.2014.240"},{"key":"16_CR37","doi-asserted-by":"crossref","unstructured":"Zuliani, P., Baier, C., Clarke, E.: Rare-event verification for stochastic hybrid systems. In: HSCC 2012 - Proceedings of the 15th ACM International Conference on Hybrid Systems: Computation and Control, April 2012","DOI":"10.1145\/2185632.2185665"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-60248-2_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,15]],"date-time":"2024-08-15T02:31:15Z","timestamp":1723689075000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-60248-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030602475","9783030602482"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-60248-2_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"29 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cloud-conf.net\/ica3pp2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"495","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"142","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"305","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}