{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T21:10:02Z","timestamp":1748898602936,"version":"3.41.0"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319336206"},{"type":"electronic","value":"9783319336220"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/2.5"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-33622-0_34","type":"book-chapter","created":{"date-parts":[[2016,4,20]],"date-time":"2016-04-20T14:42:39Z","timestamp":1461163359000},"page":"375-386","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Technique of Selecting Multiversion Software System Structure with Minimum Simultaneous Module Version Usage"],"prefix":"10.1007","author":[{"given":"Denis V.","family":"Gruzenkin","sequence":"first","affiliation":[]},{"given":"Roman Yu.","family":"Tsarev","sequence":"additional","affiliation":[]},{"given":"Alexander N.","family":"Pupkov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,21]]},"reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Carzaniga, A., Mattavelli, A., Pezze, M.: Measuring software redundancy. In: 37th IEEE International Conference on Software Engineering (ICSE), pp. 156\u2013166. IEEE\/ACM (2015)","DOI":"10.1109\/ICSE.2015.37"},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"Popov, P., Stankovic, V., Strigini, L.: An empirical study of the effectiveness of \u201cForcing\u201d diversity based on a large population of diverse programs. In: 23rd IEEE International Symposium on Software Reliability Engineering (ISSRE), pp. 41\u201350 (2012)","DOI":"10.1109\/ISSRE.2012.27"},{"key":"34_CR3","doi-asserted-by":"crossref","unstructured":"Salewski, F., Kowalewski, S.: Achieving highly reliable embedded software: An empirical evaluation of different approaches. In: 26th International Conference on Computer Safety, Reliability, and Security, SAFECOMP, pp. 270\u2013275, Nuremberg (2007)","DOI":"10.1007\/978-3-540-75101-4_26"},{"key":"34_CR4","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-1-84800-384-2_5","volume":"23","author":"HS Son","year":"2009","unstructured":"Son, H.S., Koo, S.R.: Software reliability improvement techniques. Springer Ser. Reliab. Eng. 23, 105\u2013120 (2009)","journal-title":"Springer Ser. Reliab. Eng."},{"key":"34_CR5","unstructured":"Avizienis, A., Chen, L.: On the implementation of N-version programming for software fault-tolerance during program execution. In: Proceedings of IEEE Computer Society International Conference on Computers, Software and Applications Conference, COMPSAC, pp. 149\u2013155 (1977)"},{"issue":"5","key":"34_CR6","doi-asserted-by":"publisher","first-page":"1507","DOI":"10.3906\/elk-1306-228","volume":"23","author":"MS Durmu\u015f","year":"2015","unstructured":"Durmu\u015f, M.S., Eri\u015f, O., Yildirim, U., S\u00f6ylemez, M.T.: A new bitwise voting strategy for safety-critical systems with binary decisions. Turk. J. Electr. Eng. Comput. Sci. 23(5), 1507\u20131521 (2015)","journal-title":"Turk. J. Electr. Eng. Comput. Sci."},{"key":"34_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-85729-204-9","volume-title":"Software Reliability Assessment with OR Applications","author":"PK Kapur","year":"2011","unstructured":"Kapur, P.K., Pham, H., Gupta, A., Jha, P.C.: Software Reliability Assessment with OR Applications. Springer, London Limited (2011)"},{"key":"34_CR8","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1109\/TR.2004.832819","volume":"53","author":"G Latif-Shabgahi","year":"2004","unstructured":"Latif-Shabgahi, G., Bass, J.M., Bennett, S.: A taxonomy for software voting algorithms used in safety-critical systems. IEEE Trans. Reliab. 53, 319\u2013328 (2004)","journal-title":"IEEE Trans. Reliab."},{"key":"34_CR9","unstructured":"Sommerville, I.: Software Engineering, 9th edn. Pearson, Addison-Wesley (2011)"},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"Kulyagin, V.A., Tsarev, R.Yu., Prokopenko, A.V., Nikiforov, A.Yu., Kovalev, I.V.: N-version design of fault-tolerant control software for communications satellite system. In: International Siberian Conference on Control and Communications (SIBCON), pp. 1\u20135 (2015)","DOI":"10.1109\/SIBCON.2015.7147116"},{"issue":"2","key":"34_CR11","first-page":"621","volume":"7","author":"P Kvasnica","year":"2012","unstructured":"Kvasnica, P., Kvasnica, I.: Parallel modelling of fault-tolerant software systems. Int. Rev. Comput. Softw. 7(2), 621\u2013625 (2012)","journal-title":"Int. Rev. Comput. Softw."},{"issue":"1","key":"34_CR12","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/0164-1212(94)90114-7","volume":"27","author":"H Pham","year":"1994","unstructured":"Pham, H.: On the optimal design of N-version software systems subject to constraints. J. Syst. Softw. 27(1), 55\u201361 (1994)","journal-title":"J. Syst. Softw."},{"key":"34_CR13","doi-asserted-by":"crossref","unstructured":"Rao, N.M., Goura, V.M.K.P., Roy, D.S., Mohanta, D.K.: A binary integer programming solution for optimal reliability of computer relaying software incorporating redundancy. In: Proceedings of IEEE Recent Advances in Intelligent Computational Systems, RAICS, pp. 524\u2013527 (2011)","DOI":"10.1109\/RAICS.2011.6069367"},{"issue":"8","key":"34_CR14","doi-asserted-by":"publisher","first-page":"986","DOI":"10.1057\/palgrave.jors.2602061","volume":"57","author":"T Bhaskar","year":"2006","unstructured":"Bhaskar, T., Kumar, U.D.: A cost model for N-version programming with imperfect debugging. J. Oper. Res. Soc. 57(8), 986\u2013994 (2006)","journal-title":"J. Oper. Res. Soc."},{"issue":"4","key":"34_CR15","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/s11633-007-0369-9","volume":"4","author":"PK Kapur","year":"2007","unstructured":"Kapur, P.K., Gupta, A., Jha, P.C.: Reliability growth modeling and optimal release policy under fuzzy environment of an N-version programming system incorporating the effect of fault removal efficiency. Int. J. Autom. Comput. 4(4), 369\u2013379 (2007)","journal-title":"Int. J. Autom. Comput."},{"key":"34_CR16","doi-asserted-by":"crossref","unstructured":"Yamachi, H., Tsujimura, Y., Yamamoto, H.: Pareto Distance-based MOGA for Solving bi-objective N-version Program Design Problem. Advances in Soft Computing (AISC), pp. 412\u2013422 (2005)","DOI":"10.1007\/3-540-32391-0_48"},{"key":"34_CR17","unstructured":"Yamachi, H., Yamamoto, H., Tsujimura, Y.: Multiobjective evolutionary optimal design of N-version software system. In: Advances in Safety and Reliability\u2014Proceedings of the European Safety and Reliability Conference, ESREL, vol. 2, pp. 2053\u20132060 (2005)"},{"issue":"2","key":"34_CR18","first-page":"112","volume":"57","author":"H Yamachi","year":"2006","unstructured":"Yamachi, H., Tsujimura, Y., Yamamoto, H.: Evaluating the effectiveness of applying genetic algorithms for NVP system design. J. Jpn. Ind. Manage. Assoc. 57(2), 112\u2013119 (2006)","journal-title":"J. Jpn. Ind. Manage. Assoc."},{"issue":"9","key":"34_CR19","doi-asserted-by":"publisher","first-page":"1083","DOI":"10.1016\/j.ress.2005.11.045","volume":"91","author":"H Yamachi","year":"2006","unstructured":"Yamachi, H., Tsujimura, Y., Kambayashi, Y., Yamamoto, H.: Multi-objective genetic algorithm for solving N-version program design problem. Reliab. Eng. Syst. Saf. 91(9), 1083\u20131094 (2006)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"34_CR20","doi-asserted-by":"crossref","unstructured":"Yamachi, H., Yamamoto, H., Tsujimura, Y., Kambayashi, Y.: Searching Pareto solutions of bi-objective NVP system design problem with breadth first search method. In: Proceedings of 5th IEEE\/ACIS International Conference on Computer and Information Science, ICIS, pp. 252\u2013258 (2006)","DOI":"10.1109\/ICIS-COMSAR.2006.75"},{"issue":"1","key":"34_CR21","first-page":"44","volume":"58","author":"H Yamachi","year":"2007","unstructured":"Yamachi, H., Yamamoto, H., Tsujimura, Y., Kambayashi, Y.: An algorithm employing the branch-and-bound method to search for Pareto solutions of Bi-objective NVP system design problems. J. Jpn. Ind. Manage. Assoc. 58(1), 44\u201353 (2007)","journal-title":"J. Jpn. Ind. Manage. Assoc."},{"issue":"3","key":"34_CR22","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1016\/j.ress.2004.09.001","volume":"89","author":"G Levitin","year":"2005","unstructured":"Levitin, G.: Optimal structure of fault-tolerant software systems. Reliab. Eng. Syst. Saf. 89(3), 286\u2013295 (2005)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"34_CR23","unstructured":"Levitin, G., Ben-Haim, H.: Genetic algorithm in optimization of fault-tolerant software. In: Advances in Safety and Reliability\u2014Proceedings of the European Safety and Reliability Conference, ESREL, vol. 2, pp. 1259\u20131265 (2005)"}],"container-title":["Advances in Intelligent Systems and Computing","Software Engineering Perspectives and Application in Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-33622-0_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T20:40:13Z","timestamp":1748896813000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-33622-0_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319336206","9783319336220"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-33622-0_34","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"21 April 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}