{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:52:48Z","timestamp":1743058368102,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031409226"},{"type":"electronic","value":"9783031409233"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-40923-3_4","type":"book-chapter","created":{"date-parts":[[2023,9,10]],"date-time":"2023-09-10T23:02:21Z","timestamp":1694386941000},"page":"41-54","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Cognitive Framework for Modeling Coincident Software Faults: An Experimental Study"],"prefix":"10.1007","author":[{"given":"Bo","family":"Zhao","sequence":"first","affiliation":[]},{"given":"You","family":"Song","sequence":"additional","affiliation":[]},{"given":"Wenhao","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Fuqun","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,11]]},"reference":[{"key":"4_CR1","volume-title":"Handbook of Software Reliability Engineering","author":"MR Lyu","year":"1996","unstructured":"Lyu, M.R.: Handbook of Software Reliability Engineering. IEEE Computer Society Press, California (1996)"},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1145\/384192.384195","volume":"33","author":"B Littlewood","year":"2001","unstructured":"Littlewood, B., Popov, P., Strigini, L.: Modeling software design diversity: a review. ACM Comput. Surv. 33, 177\u2013208 (2001)","journal-title":"ACM Comput. Surv."},{"key":"4_CR3","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1142\/S0218539394000052","volume":"1","author":"MR Lyu","year":"1994","unstructured":"Lyu, M.R., Chen, J.-H., Avizienis, A.: Experience in metrics and measurements for N-version programming. Int. J. Reliab. Qual. Saf. Eng. 1, 41\u201362 (1994)","journal-title":"Int. J. Reliab. Qual. Saf. Eng."},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Xu, H., Chen, Z., Wu, W., Jin, Z., Kuo, S.-y., Lyu, M.: NV-DNN: towards fault-tolerant DNN systems with N-version programming. In: 49th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), pp. 44\u201347. IEEE (2019)","DOI":"10.1109\/DSN-W.2019.00016"},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"106969","DOI":"10.1016\/j.ress.2020.106969","volume":"201","author":"G Levitin","year":"2020","unstructured":"Levitin, G., Xing, L., Xiang, Y.: Optimal early warning defense of N-version programming service against co-resident attacks in cloud system. Reliab. Eng. Syst. Saf. 201, 106969 (2020)","journal-title":"Reliab. Eng. Syst. Saf."},{"issue":"7","key":"4_CR6","doi-asserted-by":"publisher","first-page":"692","DOI":"10.1109\/32.83905","volume":"17","author":"DE Eckhardt","year":"1991","unstructured":"Eckhardt, D.E., et al.: An experimental evaluation of software redundancy as a strategy for improving reliability. IEEE Trans. Software Eng. 17(7), 692\u2013702 (1991). https:\/\/doi.org\/10.1109\/32.83905","journal-title":"IEEE Trans. Software Eng."},{"key":"4_CR7","first-page":"96","volume":"12","author":"CK John","year":"1986","unstructured":"John, C.K., Leveson, N.G.: An experimental evaluation of the assumption of independence in multi-version programming. IEEE Trans. Software Eng. 12, 96\u2013109 (1986)","journal-title":"IEEE Trans. Software Eng."},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Avzenis, A., Lyu, M.R., Schutz, W.: In search of effective diversity: a six-language study of fault-tolerant flight control software. In: Proceedings of the 18th International Symposium on Fault-Tolerant Computing, pp. 15\u201322. (1988)","DOI":"10.1109\/FTCS.1988.5291"},{"key":"4_CR9","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1049\/ip-sen:19982444","volume":"145","author":"R Feldt","year":"1998","unstructured":"Feldt, R.: Generating diverse software versions with genetic programming: an experimental study. IEE Proc., Softw. 145, 228\u2013236 (1998)","journal-title":"IEE Proc., Softw."},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/S0164-1212(01)00127-3","volume":"62","author":"CS Yoo","year":"2002","unstructured":"Yoo, C.S., Seong, P.H.: Experimental analysis of specification language diversity impact on NPP software diversity. J. Syst. Softw. 62, 111\u2013122 (2002)","journal-title":"J. Syst. Softw."},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Meine, J.P., van der Meulen, M.A.R.: Correlations between internal software metrics and software dependability in a large population of small C\/C++ programs. In: 18th IEEE International Symposium on Software Reliability Engineering, pp. 203\u2013208. IEEE Computer Society (2007)","DOI":"10.1109\/ISSRE.2007.12"},{"key":"4_CR12","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139062367","volume-title":"Human Error","author":"J Reason","year":"1990","unstructured":"Reason, J.: Human Error. Cambridge University Press, Cambridge, UK (1990)"},{"key":"4_CR13","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/TSMC.1983.6313160","volume":"13","author":"J Rasmussen","year":"1983","unstructured":"Rasmussen, J.: Skills, rules, and knowledge; signals, signs, and symbols, and other distinctions in human performance models. IEEE Trans. Syst. Man Cybern. 13, 257\u2013266 (1983)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"4_CR14","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1207\/s15516709cog2101_2","volume":"21","author":"MD Byrne","year":"1997","unstructured":"Byrne, M.D., Bovair, S.: A working memory model of a common procedural error. Cogn. Sci. 21, 31\u201361 (1997)","journal-title":"Cogn. Sci."},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Palanque, P., Cockburn, A., Gutwin, C.: A classification of faults covering the human-computer interaction loop. In: 39th International Conference Computer Safety, Reliability, and Security, pp. 434\u2013448. Springer (2020)","DOI":"10.1007\/978-3-030-54549-9_29"},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"1318","DOI":"10.1109\/TSE.2018.2877759","volume":"46","author":"R Mohanani","year":"2018","unstructured":"Mohanani, R., Salman, I., Turhan, B., Rodr\u00edguez, P., Ralph, P.: Cognitive biases in software engineering: a systematic mapping study. IEEE Trans. Software Eng. 46, 1318\u20131339 (2018)","journal-title":"IEEE Trans. Software Eng."},{"key":"4_CR17","unstructured":"Huang, F., Liu, B., Huang, B.: A taxonomy system to identify human error causes for software defects. In: The 18th international conference on reliability and quality in design, pp. 44\u201349. International Society of Science and Applied Technologies (2012)"},{"key":"4_CR18","doi-asserted-by":"publisher","first-page":"3626","DOI":"10.1109\/ACCESS.2023.3234490","volume":"11","author":"F Huang","year":"2023","unstructured":"Huang, F., Strigini, L.: HEDF: a method for early forecasting software defects based on human error mechanisms. IEEE Access 11, 3626\u20133652 (2023)","journal-title":"IEEE Access"},{"key":"4_CR19","unstructured":"Li, S.Y., Blandford, A., Cairns, P., Young, R.M.: Post-completion errors in problem solving. In: Proceedings of the Twenty-Seventh Annual Conference of the Cognitive Science Society. Citeseer (2005)"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Huang, F.: Post-completion error in software development. In: The 9th International Workshop on Cooperative and Human Aspects of Software Engineering, ICSE 2016, pp. 108\u2013113. ACM (2016)","DOI":"10.1145\/2897586.2897608"},{"key":"4_CR21","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1016\/j.sapharm.2012.04.004","volume":"9","author":"N Gisev","year":"2013","unstructured":"Gisev, N., Bell, J.S., Chen, T.F.: Interrater agreement and interrater reliability: key concepts, approaches, and applications. Res. Social Adm. Pharm. 9, 330\u2013338 (2013)","journal-title":"Res. Social Adm. Pharm."},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Popov, P., Stankovic, V., Strigini, L.: An empirical study of the effectiveness of \u201cforcing\u201d diversity based on a large population of diverse programs. In: 23rd International Symposium on Software Reliability Engineering, pp. 41\u201350. IEEE (2012)","DOI":"10.1109\/ISSRE.2012.27"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-40923-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T21:04:17Z","timestamp":1730063057000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-40923-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031409226","9783031409233"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-40923-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"11 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAFECOMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Safety, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toulouse","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"42","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"safecomp2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/safecomp2023.cnrs.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"100","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5.7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"For the workshops, 35 out of 49 papers have been accepted","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}