{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T08:29:32Z","timestamp":1743150572824,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030634056"},{"type":"electronic","value":"9783030634063"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-63406-3_3","type":"book-chapter","created":{"date-parts":[[2020,12,18]],"date-time":"2020-12-18T16:05:19Z","timestamp":1608307519000},"page":"36-52","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Reasoning with Failures"],"prefix":"10.1007","author":[{"given":"Hamid","family":"Jahanian","sequence":"first","affiliation":[]},{"given":"Annabelle","family":"McIver","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,19]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/0304-3975(86)90172-6","volume":"43","author":"R Berghammer","year":"1986","unstructured":"Berghammer, R., Zierer, H.: Relational algebraic semantics of deterministic and nondeterministic programs. Theoret. Comput. Sci. 43, 123\u2013147 (1986)","journal-title":"Theoret. Comput. Sci."},{"issue":"1\u20133","key":"3_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0004-3702(84)90036-5","volume":"24","author":"DG Bobrow","year":"1984","unstructured":"Bobrow, D.G.: Qualitative reasoning about physical systems: an introduction. Artif. Intell. 24(1\u20133), 1\u20135 (1984)","journal-title":"Artif. Intell."},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-319-11936-6_7","volume-title":"Automated Technology for Verification and Analysis","author":"M Bozzano","year":"2014","unstructured":"Bozzano, M., Cimatti, A., Mattarei, C., Tonetta, S.: Formal safety assessment via contract-based design. In: Cassez, F., Raskin, J.-F. (eds.) ATVA 2014. LNCS, vol. 8837, pp. 81\u201397. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11936-6_7"},{"key":"3_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10575-8","volume-title":"Handbook of model checking","author":"EM Clarke","year":"2018","unstructured":"Clarke, E.M., Henzinger, T.A., Veith, H., Bloem, R.: Handbook of model checking, vol. 10. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-319-10575-8"},{"issue":"4","key":"3_CR5","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1093\/logcom\/2.4.511","volume":"2","author":"P Cousot","year":"1992","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation frameworks. J. Log. Comput. 2(4), 511\u2013547 (1992)","journal-title":"J. Log. Comput."},{"key":"3_CR6","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511852008","volume-title":"Boolean Functions: Theory, Algorithms, and Applications","author":"Y Crama","year":"2011","unstructured":"Crama, Y., Hammer, P.L.: Boolean Functions: Theory, Algorithms, and Applications. Cambridge University Press, Cambridge (2011)"},{"key":"3_CR7","series-title":"Foundations of Computing","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/2516.001.0001","volume-title":"Dynamic Logic","author":"DKD Harel","year":"2000","unstructured":"Harel, D.K.D., Tiuryn, J.: Dynamic Logic. Foundations of Computing. MIT Press, Cambridge (2000)"},{"issue":"1\u20133","key":"3_CR8","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1016\/0004-3702(84)90042-0","volume":"24","author":"R Davis","year":"1984","unstructured":"Davis, R.: Diagnostic reasoning based on structure and behavior. Artif. Intell. 24(1\u20133), 347\u2013410 (1984)","journal-title":"Artif. Intell."},{"issue":"1\u20133","key":"3_CR9","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/0004-3702(84)90037-7","volume":"24","author":"J De Kleer","year":"1984","unstructured":"De Kleer, J., Brown, J.S.: A qualitative physics based on confluences. Artif. Intell. 24(1\u20133), 7\u201383 (1984)","journal-title":"Artif. Intell."},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-642-10452-7_3","volume-title":"Formal Methods: Foundations and Applications","author":"L de Moura","year":"2009","unstructured":"de Moura, L., Bj\u00f8rner, N.: Satisfiability modulo theories: an appetizer. In: Oliveira, M.V.M., Woodcock, J. (eds.) SBMF 2009. LNCS, vol. 5902, pp. 23\u201336. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-10452-7_3"},{"key":"3_CR11","volume-title":"A Discipline of Programming","author":"EW Dijkstra","year":"1976","unstructured":"Dijkstra, E.W.: A Discipline of Programming, vol. 1. Prentice-Hall, Englewood Cliffs (1976)"},{"key":"3_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/978-3-642-24270-0_28","volume-title":"Computer Safety, Reliability, and Security","author":"A Fantechi","year":"2011","unstructured":"Fantechi, A., Gnesi, S.: On the adoption of model checking in safety-related software industry. In: Flammini, F., Bologna, S., Vittorini, V. (eds.) SAFECOMP 2011. LNCS, vol. 6894, pp. 383\u2013396. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24270-0_28"},{"issue":"2","key":"3_CR13","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/3092893.3092900","volume":"36","author":"P Feiler","year":"2017","unstructured":"Feiler, P., Delange, J.: Automated fault tree analysis from aadl models. ACM SIGAda Ada Lett. 36(2), 39\u201346 (2017)","journal-title":"ACM SIGAda Ada Lett."},{"issue":"1\u20133","key":"3_CR14","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1016\/0004-3702(84)90043-2","volume":"24","author":"MR Genesereth","year":"1984","unstructured":"Genesereth, M.R.: The use of design descriptions in automated diagnosis. Artif. Intell. 24(1\u20133), 411\u2013436 (1984)","journal-title":"Artif. Intell."},{"key":"3_CR15","unstructured":"IEC: Programmable controllers - Part 3: Programming languages (2013)"},{"key":"3_CR16","unstructured":"IEC: Functional safety-Safety instrumented systems for the process industry sector - Part 1: Framework, definitions, system, hardware and application programming requirements (2016)"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Jahanian, H.: Failure mode reasoning. In: 2019 4th International Conference on System Reliability and Safety (ICSRS), pp. 295\u2013303. IEEE (2019)","DOI":"10.1109\/ICSRS48664.2019.8987716"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Jahanian, H., McIver, A.: Reasoning with failures. arXiv preprint arXiv:2007.10841 (2020)","DOI":"10.1007\/978-3-030-63406-3_3"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Jahanian, H., Parker, D., Zeller, M., McIver, A., Papadopoulos, Y.: Failure mode reasoning in model based safety analysis. In: 7th International Symposium on Model-Based Safety and Assessment (2020)","DOI":"10.1007\/978-3-030-58920-2_9"},{"key":"3_CR20","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.eswa.2017.01.058","volume":"77","author":"S Kabir","year":"2017","unstructured":"Kabir, S.: An overview of fault tree analysis and its application in model based dependability analysis. Expert Syst. Appl. 77, 114\u2013135 (2017)","journal-title":"Expert Syst. Appl."},{"key":"3_CR21","unstructured":"Kaiser, B., Liggesmeyer, P., M\u00e4ckel, O.: A new component concept for fault trees. In: Proceedings of the 8th Australian Workshop on Safety Critical Systems and Software, vol. 33, pp. 37\u201346. ACS Inc. (2003)"},{"key":"3_CR22","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.ress.2012.03.021","volume":"105","author":"J Lahtinen","year":"2012","unstructured":"Lahtinen, J., Valkonen, J., Bj\u00f6rkman, K., Frits, J., Niemel\u00e4, I., Heljanko, K.: Model checking of safety-critical software in the nuclear engineering domain. Reliab. Eng. Syst. Saf. 105, 104\u2013113 (2012)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"3_CR23","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.proeng.2014.09.070","volume":"80","author":"S Li","year":"2014","unstructured":"Li, S., Li, X.: Study on generation of fault trees from altarica models. Proc. Eng. 80, 140\u2013152 (2014)","journal-title":"Proc. Eng."},{"key":"3_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-4721-8","volume-title":"Categories for the Working Mathematician","author":"S Mac Lane","year":"1978","unstructured":"Mac Lane, S.: Categories for the Working Mathematician. Springer, Heidelberg (1978). https:\/\/doi.org\/10.1007\/978-1-4757-4721-8"},{"key":"3_CR25","unstructured":"McIver, A.K., Morgan, C., Sanders, J.W.: Application-oriented program semantics. In: South African Computer Society (SAICSIT) (1997)"},{"key":"3_CR26","series-title":"Texts and Monographs in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/978-1-4612-4476-9_37","volume-title":"Beauty is Our Business","author":"C Morgan","year":"1990","unstructured":"Morgan, C.: Of wp and CSP. In: Feijen, W.H.J., van Gasteren, A.J.M., Gries, D., Misra, J. (eds.) Beauty is Our Business. Texts and Monographs in Computer Science, pp. 319\u2013326. Springer, New York (1990). https:\/\/doi.org\/10.1007\/978-1-4612-4476-9_37"},{"key":"3_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-48249-0_13","volume-title":"Computer Safety, Reliability and Security","author":"Y Papadopoulos","year":"1999","unstructured":"Papadopoulos, Y., McDermid, J.A.: Hierarchically performed hazard origin and propagation studies. In: Felici, M., Kanoun, K. (eds.) SAFECOMP 1999. LNCS, vol. 1698, pp. 139\u2013152. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48249-0_13"},{"issue":"1","key":"3_CR28","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/0004-3702(87)90062-2","volume":"32","author":"R Reiter","year":"1987","unstructured":"Reiter, R.: A theory of diagnosis from first principles. Artif. Intell. 32(1), 57\u201395 (1987)","journal-title":"Artif. Intell."},{"key":"3_CR29","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.cosrev.2015.03.001","volume":"15","author":"E Ruijters","year":"2015","unstructured":"Ruijters, E., Stoelinga, M.: Fault tree analysis: a survey of the state-of-the-art in modeling, analysis and tools. Comput. Sci. Rev. 15, 29\u201362 (2015)","journal-title":"Comput. Sci. Rev."},{"key":"3_CR30","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.ress.2014.10.025","volume":"135","author":"S Sharvia","year":"2015","unstructured":"Sharvia, S., Papadopoulos, Y.: Integrating model checking with HiP-HOPS in model-based safety analysis. Reliab. Eng. Syst. Saf. 135, 64\u201380 (2015)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"3_CR31","unstructured":"Siemens: Industrial software S7 F\/FH Systems - Configuring and Programming. Siemens (2015)"},{"key":"3_CR32","unstructured":"Vesely, W.E., Goldberg, F.F., Roberts, N.H., Haasl, D.F.: Fault tree handbook (NUREG-0492). US Nuclear Regulatory Commission (1981)"}],"container-title":["Lecture Notes in Computer Science","Formal Methods and Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-63406-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,6]],"date-time":"2022-12-06T20:52:15Z","timestamp":1670359935000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-63406-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030634056","9783030634063"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-63406-3_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"19 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICFEM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Formal Engineering Methods","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 March 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 March 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icfem2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/formal-analysis.com\/icfem\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1 Doctoral symposium paper in the back matter","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}