{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T11:10:07Z","timestamp":1746357007835,"version":"3.40.4"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319105567"},{"type":"electronic","value":"9783319105574"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-10557-4_20","type":"book-chapter","created":{"date-parts":[[2014,8,27]],"date-time":"2014-08-27T12:12:24Z","timestamp":1409141544000},"page":"167-179","source":"Crossref","is-referenced-by-count":1,"title":["Towards Assured Dynamic Configuration of Safety-Critical Embedded Systems"],"prefix":"10.1007","author":[{"given":"Nermin","family":"Kajtazovic","sequence":"first","affiliation":[]},{"given":"Christopher","family":"Preschern","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"H\u00f6ller","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Kreiner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Adler, R., Schaefer, I., Trapp, M., Poetzsch-Heffter, A.: Component-based modeling and verification of dynamic adaptation in safety-critical embedded systems. ACM Trans. Embed. Comput. Syst.\u00a010(2), 20:1\u201320:39 (2011)","DOI":"10.1145\/1880050.1880056"},{"issue":"4","key":"20_CR2","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MSP.2013.49","volume":"11","author":"H. Alemzadeh","year":"2013","unstructured":"Alemzadeh, H., Iyer, R., Kalbarczyk, Z., Raman, J.: Analysis of safety-critical computer failures in medical devices. IEEE Security Privacy\u00a011(4), 14\u201326 (2013)","journal-title":"IEEE Security Privacy"},{"key":"20_CR3","unstructured":"Benveniste, A., Caillaud, B., Nickovic, D., Passerone, R., Raclet, J.B., Reinkemeier, P., Sangiovanni-Vincentelli, A., Damm, W., Henzinger, T., Larsen, K.: Contracts for Systems Design. Tech. rep., Research Report, Nr. 8147, 2012, Inria (2012)"},{"key":"20_CR4","unstructured":"Butz, H.: Open integrated modular avionic (ima): State of the art and future development road map at airbus deutschland. Department of Avionic Systems at Airbus Deutschland GmbH Kreetslag 10, D-21129 Hamburg, Germany (-)"},{"key":"20_CR5","volume-title":"Building Reliable Component-Based Software Systems","author":"I. Crnkovic","year":"2002","unstructured":"Crnkovic, I.: Building Reliable Component-Based Software Systems. Artech House, Inc., Norwood (2002)"},{"key":"20_CR6","unstructured":"FAA: Guidelines for the Oversight of Software Change Impact Analyses used to Classify Software Changes as Major or Minor. Notice 8110.85, FAA (2000)"},{"key":"20_CR7","unstructured":"FAA: AC20-148 Reusable Software Components. Tr, FAA (2004)"},{"key":"20_CR8","unstructured":"Frey, P.: Case Study: Engine Control Application. Tech. rep., Ulmer Informatik-Berichte, Nr. 2010-03 (2010)"},{"key":"20_CR9","unstructured":"Gluch, D., Weinstock, C.: Workshop on the State of the Practice in Dependably Upgrading Critical Systems: April 16-17, 1997. Special report, Carnegie Mellon University, Software Engineering Institute (1997)"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Kajtazovic, N., Preschern, C., Kreiner, C.: A component-based dynamic link support for safety-critical embedded systems. In: 20th IEEE ECBS (2013)","DOI":"10.1109\/ECBS.2013.19"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Kajtazovic, N., Preschern, A., Hoeller, C., Kreiner, C.: Constraint-based verification of compositions in safety-critical component-based systems. In: IEEE\/ACIS SNPD (June 2014)","DOI":"10.2991\/ijndc.2014.2.3.7"},{"key":"20_CR12","unstructured":"Kindel, O., Friedrich, M.: Softwareentwicklung mit AUTOSAR: Grundlagen, Engineering, Management in der Praxis. dpunkt Verlag, Auflage: 1 (2009)"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Lopez-Jaquero, V., Montero, F., Navarro, E., Esparcia, A., Catal\u2019n, J.: Supporting arinc 653-based dynamic reconfiguration. In: 2012 Joint WICSA and ECSA (2012)","DOI":"10.1109\/WICSA-ECSA.212.9"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Marriott, K., Stuckey, P.J.: Programming with Constraints: An Introduction. The MIT Press (March 1998)","DOI":"10.7551\/mitpress\/5625.001.0001"},{"key":"20_CR15","unstructured":"Montano, G.: Dynamic reconfiguration of safety-critical systems: Automation and human involvement. PhD Thesis (2011)"},{"key":"20_CR16","unstructured":"Pop, P., Tsiopoulos, L., Voss, S., Slotosch, O., Ficek, C., Nyman, U., Ruiz, A.: Methods and tools for reducing certification costs of mixed-criticality applications on multi-core platforms: the recomp approach. In: WICERT (2013)"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Rierson, L.: A systematic process for changing safety-critical software. In: Proceedings of the 19th Digital Avionics Systems Conference, DASC, vol.\u00a01, pp. 1B1\/1\u20131B1\/7 (2000)","DOI":"10.1109\/DASC.2000.886878"},{"key":"20_CR18","unstructured":"Smith, D., Simpson, K.: A Straightforward Guide to Functional Safety, IEC 61508 (2010 Edition) and Related Standards, Including Process IEC 61511 and Machinery IEC 62061 and ISO 13849. Elsevier Science (2010)"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Soliman, D., Thramboulidis, K., Frey, G.: A methodology to upgrade legacy industrial systems to meet safety regulations. In: 2011 3rd International Workshop on Dependable Control of Discrete Systems (DCDS), pp. 141\u2013147 (June 2011)","DOI":"10.1109\/DCDS.2011.5970332"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Zhang, M., Ogata, K., Futatsugi, K.: Formalization and verification of behavioral correctness of dynamic software updates. Electronic Notes in Theoretical Computer Science\u00a0294, 12\u201323 (2013); Proceedings of the 2013 VSSE Workshop","DOI":"10.1016\/j.entcs.2013.02.013"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10557-4_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T10:51:54Z","timestamp":1746355914000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-10557-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319105567","9783319105574"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10557-4_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}