{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T05:02:50Z","timestamp":1766466170447},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540231769"},{"type":"electronic","value":"9783540301387"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30138-7_6","type":"book-chapter","created":{"date-parts":[[2010,9,19]],"date-time":"2010-09-19T00:10:34Z","timestamp":1284855034000},"page":"60-71","source":"Crossref","is-referenced-by-count":6,"title":["An Empirical Exploration of the Difficulty Function"],"prefix":"10.1007","author":[{"given":"Julian G. W.","family":"Bentley","sequence":"first","affiliation":[]},{"given":"Peter G.","family":"Bishop","sequence":"additional","affiliation":[]},{"given":"Meine","family":"van der Meulen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Avizienis, A., Chen, L.: On the Implementation of N-version Programming for Software Fault Tolerance during Execution. In: Proc. the First IEEE-CS International Computer Software and Applications Conference (COMPSAC 1977), Chicago (November 1977)"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Avizienis, A., Kelly, J.P.J.: Fault Tolerance by Design Diversity: Concepts and Experiments. Computer\u00a017(8) (August 1984)","DOI":"10.1109\/MC.1984.1659219"},{"key":"6_CR3","first-page":"491","volume-title":"Information Processing","author":"A. Avizienis","year":"1989","unstructured":"Avizienis, A.: Software Fault Tolerance. In: Titter, G.X. (ed.) Information Processing, pp. 491\u2013498. Elsevier Science Publishers, Holland (1989)"},{"issue":"9","key":"6_CR4","doi-asserted-by":"crossref","first-page":"929","DOI":"10.1109\/TSE.1986.6313048","volume":"SE-12","author":"P.G. Bishop","year":"1986","unstructured":"Bishop, P.G., Barnes, M., et al.: PODS a Project on Diverse Software. IEEE Trans. Software Engineering\u00a0SE-12(9), 929\u2013940 (1986)","journal-title":"IEEE Trans. Software Engineering"},{"issue":"12","key":"6_CR5","doi-asserted-by":"publisher","first-page":"1511","DOI":"10.1109\/TSE.1985.231895","volume":"SE-11","author":"D.E. Eckhardt","year":"1985","unstructured":"Eckhardt, D.E., Lee, L.D.: A theoretical basis for the analysis of multiversion software subject to coincident errors. IEEE Transactions on Software Engineering\u00a0SE-11(12), 1511\u20131517 (1985)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"1","key":"6_CR6","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/TSE.1986.6312924","volume":"SE-12","author":"J.C. Knight","year":"1986","unstructured":"Knight, J.C., Leveson, N.G.: An Experimental Evaluation of the Assumption of Independence in Multi-Version Programming. IEEE Transactions on Software Engineering\u00a0SE-12(1), 96\u2013109 (1986)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"2","key":"6_CR7","doi-asserted-by":"publisher","first-page":"1596","DOI":"10.1109\/32.58771","volume":"15","author":"B. Littlewood","year":"1989","unstructured":"Littlewood, B., Miller, D.R.: Conceptual Modelling of Coincident Failures in Multiversion Software. IEEE Transactions on Software Engineering\u00a015(2), 1596\u20131614 (1989)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"2","key":"6_CR8","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1145\/384192.384195","volume":"33","author":"B. Littlewood","year":"2001","unstructured":"Littlewood, B., Popov, P., Strigini, L.: Modelling software design diversity - a review. ACM Computing Surveys\u00a033(2), 177\u2013208 (2001)","journal-title":"ACM Computing Surveys"},{"key":"6_CR9","volume-title":"Programming Challenges","author":"S. Skiena","year":"2003","unstructured":"Skiena, S., Revilla, M.: Programming Challenges. Springer, Heidelberg (2003) ISBN: 0387001638, \n                    \n                      http:\/\/acm.uva.es\/problemset\/"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30138-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,20]],"date-time":"2019-03-20T22:45:03Z","timestamp":1553121903000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30138-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540231769","9783540301387"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30138-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}