{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:48:57Z","timestamp":1740098937866,"version":"3.37.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319662657"},{"type":"electronic","value":"9783319662664"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66266-4_19","type":"book-chapter","created":{"date-parts":[[2017,8,15]],"date-time":"2017-08-15T22:33:31Z","timestamp":1502836411000},"page":"287-302","source":"Crossref","is-referenced-by-count":2,"title":["SMT-Based Synthesis of Fault-Tolerant Architectures"],"prefix":"10.1007","author":[{"given":"Kevin","family":"Delmas","sequence":"first","affiliation":[]},{"given":"R\u00e9mi","family":"Delmas","sequence":"additional","affiliation":[]},{"given":"Claire","family":"Pagetti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,17]]},"reference":[{"key":"19_CR1","unstructured":"SAE: Aerospace Recommended Practices 4754a - Development of Civil Aircraft and Systems (2010)"},{"key":"19_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/978-3-540-74035-3_9","volume-title":"Architecting Dependable Systems IV","author":"L Grunske","year":"2007","unstructured":"Grunske, L., Lindsay, P., Bondarev, E., Papadopoulos, Y., Parker, D.: An outline of an architecture-based method for optimizing dependability attributes of software-intensive systems. In: Lemos, R., Gacek, C., Romanovsky, A. (eds.) WADS 2006. LNCS, vol. 4615, pp. 188\u2013209. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-74035-3_9"},{"issue":"5","key":"19_CR3","doi-asserted-by":"crossref","first-page":"658","DOI":"10.1109\/TSE.2012.64","volume":"39","author":"A Aleti","year":"2013","unstructured":"Aleti, A., Buhnova, B., Grunske, L., Koziolek, A., Meedeniya, I.: Software architecture optimization methods: a systematic literature review. IEEE Trans. Softw. Eng. 39(5), 658\u2013683 (2013)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"19_CR4","unstructured":"Kehren, C., Seguin, C., Bieber, P., Castel, C., Bougnol, C., Heckmann, J.P., Metge, S.: Architecture patterns for safe design. In: AAAF 1st Complex and Safe Systems Engineering Conference (CS2E 2004), pp. 21\u201322. Citeseer (2004)"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Armoush, A.: Design patterns for safety-critical embedded systems. Ph.D. thesis, RWTH Aachen University (2010)","DOI":"10.1109\/SEAA.2009.12"},{"key":"19_CR6","unstructured":"Barrett, C., Fontaine, P., Tinelli, C.: The SMT-LIB standard\u2013version 2.5 (2010)"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-540-75596-8_13","volume-title":"Automated Technology for Verification and Analysis","author":"M Bozzano","year":"2007","unstructured":"Bozzano, M., Cimatti, A., Tapparo, F.: Symbolic fault tree analysis for reactive systems. In: Namjoshi, K.S., Yoneda, T., Higashino, T., Okamura, Y. (eds.) ATVA 2007. LNCS, vol. 4762, pp. 162\u2013176. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-75596-8_13"},{"key":"19_CR8","volume-title":"Reliability, Availability, Maintainbility and Safety Assessment","author":"A Villemeur","year":"1992","unstructured":"Villemeur, A.: Reliability, Availability, Maintainbility and Safety Assessment. Wiley, Chichester (1992)"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Pagetti, C., Saussi\u00e9, D., Gratia, R., Noulard, E., Siron, P.: The ROSACE case study: from simulink specification to multi\/many-core execution. In: 2014 IEEE 20th Real-Time and Embedded Technology and Applications Symposium (RTAS), pp. 309\u2013318. IEEE (2014)","DOI":"10.1109\/RTAS.2014.6926012"},{"issue":"4","key":"19_CR10","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1109\/24.983400","volume":"50","author":"A Rauzy","year":"2001","unstructured":"Rauzy, A.: Mathematical foundations of minimal cutsets. IEEE Trans. Reliab. 50(4), 389\u2013396 (2001)","journal-title":"IEEE Trans. Reliab."},{"key":"19_CR11","first-page":"825","volume":"185","author":"CW Barrett","year":"2009","unstructured":"Barrett, C.W., Sebastiani, R., Seshia, S.A., Tinelli, C.: Satisfiability modulo theories. Handb. Satisfiability 185, 825\u2013885 (2009)","journal-title":"Handb. Satisfiability"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Srinivasan, A., Ham, T., Malik, S., Brayton, R.K.: Algorithms for discrete function manipulation. In: 1990 IEEE International Conference on Computer-Aided Design, ICCAD-1990, Digest of Technical Papers, pp. 92\u201395. IEEE (1990)","DOI":"10.1109\/ICCAD.1990.129849"},{"issue":"11","key":"19_CR13","doi-asserted-by":"crossref","first-page":"1303","DOI":"10.1002\/spe.1044","volume":"41","author":"M Adachi","year":"2011","unstructured":"Adachi, M., Papadopoulos, Y., Sharvia, S., Parker, D., Tohdo, T.: An approach to optimization of fault tolerant architectures using hip-hops. Softw. Pract. Exp. 41(11), 1303\u20131327 (2011)","journal-title":"Softw. Pract. Exp."},{"key":"19_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-540-78800-3_24","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"L Moura de","year":"2008","unstructured":"de Moura, L., Bj\u00f8rner, N.: Z3: an efficient SMT solver. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol. 4963, pp. 337\u2013340. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-78800-3_24"},{"issue":"10","key":"19_CR15","doi-asserted-by":"crossref","first-page":"2467","DOI":"10.1016\/j.jss.2013.04.001","volume":"86","author":"M Walker","year":"2013","unstructured":"Walker, M., Reiser, M.O., Tucci-Piergiovanni, S., Papadopoulos, Y., L\u00f6nn, H., Mraidha, C., Parker, D., Chen, D., Servat, D.: Automatic optimisation of system architectures using EAST-ADL. J. Syst. Softw. 86(10), 2467\u20132487 (2013)","journal-title":"J. Syst. Softw."},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Amari, S.V., Dill, G.: Redundancy optimization problem with warm-standby redundancy. In: 2010 Proceedings-Annual Reliability and Maintainability Symposium (RAMS), pp. 1\u20136. IEEE (2010)","DOI":"10.1109\/RAMS.2010.5448068"},{"issue":"4","key":"19_CR17","doi-asserted-by":"crossref","first-page":"830","DOI":"10.1016\/j.ress.2008.09.001","volume":"94","author":"L Santos Coelho dos","year":"2009","unstructured":"dos Santos Coelho, L.: An efficient particle swarm approach for mixed-integer programming in reliability-redundancy optimization applications. Reliab. Eng. Syst. Saf. 94(4), 830\u2013837 (2009)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"19_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-319-24255-2_21","volume-title":"Computer Safety, Reliability, and Security","author":"K Delmas","year":"2015","unstructured":"Delmas, K., Delmas, R., Pagetti, C.: Automatic architecture hardening using safety patterns. In: Koornneef, F., Gulijk, C. (eds.) SAFECOMP 2015. LNCS, vol. 9337, pp. 283\u2013296. Springer, Cham (2015). doi: 10.1007\/978-3-319-24255-2_21"},{"key":"19_CR19","unstructured":"Messaoud, S.: Optimal Architecture Synthesis for Aircraft Electrical Power Systems. Ph.D. thesis, University of California Berkeley (2013)"},{"issue":"4","key":"19_CR20","first-page":"49","volume":"20","author":"S Peter","year":"2015","unstructured":"Peter, S., Givargis, T.: Component-based synthesis of embedded systems using satisfiability modulo theories. ACM Trans. Des. Autom. Electron. Syst. (TODAES) 20(4), 49 (2015)","journal-title":"ACM Trans. Des. Autom. Electron. Syst. (TODAES)"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Mattarei, C., Cimatti, A., Gario, M., Tonetta, S., Rozier, K.Y.: Comparing different functional allocations in automated air traffic control design. In: Formal Methods in Computer-Aided Design (FMCAD), pp. 112\u2013119. IEEE (2015)","DOI":"10.1109\/FMCAD.2015.7542260"},{"key":"19_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-41540-6_1","volume-title":"Computer Aided Verification","author":"M Gario","year":"2016","unstructured":"Gario, M., Cimatti, A., Mattarei, C., Tonetta, S., Rozier, K.Y.: Model checking at scale: automated air traffic control design space exploration. In: Chaudhuri, S., Farzan, A. (eds.) CAV 2016. LNCS, vol. 9780, pp. 3\u201322. Springer, Cham (2016). doi: 10.1007\/978-3-319-41540-6_1"},{"key":"19_CR23","unstructured":"Dassault: Cecilia OCAS framework (2014)"},{"issue":"3","key":"19_CR24","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1145\/136035.136043","volume":"24","author":"RE Bryant","year":"1992","unstructured":"Bryant, R.E.: Symbolic boolean manipulation with ordered binary-decision diagrams. ACM Comput. Surv. (CSUR) 24(3), 293\u2013318 (1992)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"19_CR25","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1007\/978-1-84800-131-2_25","volume-title":"Handbook of Performability Engineering","author":"A Rauzy","year":"2008","unstructured":"Rauzy, A.: Binary decision diagrams for reliability studies. In: Misra, K.B. (ed.) Handbook of Performability Engineering, pp. 381\u2013396. Springer, London (2008)"},{"issue":"4","key":"19_CR26","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/BF02241270","volume":"44","author":"P Hansen","year":"1990","unstructured":"Hansen, P., Jaumard, B.: Algorithms for the maximum satisfiability problem. Computing 44(4), 279\u2013303 (1990)","journal-title":"Computing"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66266-4_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T08:38:45Z","timestamp":1570005525000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-66266-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319662657","9783319662664"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66266-4_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}