{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:01:54Z","timestamp":1725512514399},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540681281"},{"type":"electronic","value":"9783540681298"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-68129-8_7","type":"book-chapter","created":{"date-parts":[[2008,5,15]],"date-time":"2008-05-15T08:14:59Z","timestamp":1210839299000},"page":"59-74","source":"Crossref","is-referenced-by-count":0,"title":["Interaction Faults Caused by Third-Party External Systems \u2014 A Case Study and Challenges"],"prefix":"10.1007","author":[{"given":"Bogdan Tomoyuki","family":"Nassu","sequence":"first","affiliation":[]},{"given":"Takashi","family":"Nanya","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"7_CR1","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/174800.174801","volume":"1","author":"M. Weiser","year":"1994","unstructured":"Weiser, M.: The World is not a Desktop. Interactions\u00a01(1), 7\u20138 (1994)","journal-title":"Interactions"},{"key":"7_CR2","unstructured":"Digital Living Network Alliance: DLNA Home Page, www.dlna.org"},{"issue":"292","key":"7_CR3","first-page":"7","volume":"106","author":"B.T. Nassu","year":"2006","unstructured":"Nassu, B.T., Nanya, T.: Tolerating Interaction Faults Originated From External Systems. IEICE Technical Report\u00a0106(292), 7\u201312 (2006)","journal-title":"IEICE Technical Report"},{"issue":"1","key":"7_CR4","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A. Avizienis","year":"2004","unstructured":"Avizienis, A., et al.: Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Transactions on Dependable and Secure Computing\u00a01(1), 11\u201333 (2004)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Jarboui, T., Arlat, J., Crouzet, Y., Kanoun, K., Marteau, T.: Analysis of the Effects of Real and Injected Software Faults: Linux as a Case Study. In: PRCD 2002: Proceedings of the 2002 Pacific Rim International Symposium on Dependable Computing, Tsukuba, Japan, pp. 51\u201358 (2002)","DOI":"10.1109\/PRDC.2002.1185618"},{"issue":"11","key":"7_CR6","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1109\/TSE.2006.113","volume":"32","author":"J.A. Duraes","year":"2006","unstructured":"Duraes, J.A., Madeira, H.S.: Emulation of Software Faults: A Field Data Study and a Practical Approach. IEEE Transactions on Software Engineering\u00a032(11), 849\u2013867 (2006)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"7_CR7","unstructured":"Duraes, J.A., Madeira, H.S.: TCPDUMP Public Repository, http:\/\/www.tcpdump.org"},{"key":"7_CR8","unstructured":"Contributing Members of the UPnP Forum: UPnP Device Architecture 1.0 (2003)"},{"key":"7_CR9","unstructured":"Contributing Members of the UPnP Forum: InternetGatewayDevice:1 Device Template Version 1.01 (2001)"},{"issue":"1","key":"7_CR10","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/S0164-1212(01)00132-7","volume":"62","author":"R. Lai","year":"2002","unstructured":"Lai, R.: A Survey of Communication Protocol Testing. Journal of Systems and Software\u00a062(1), 21\u201346 (2002)","journal-title":"Journal of Systems and Software"},{"key":"7_CR11","volume-title":"The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities","author":"M. Dowd","year":"2006","unstructured":"Dowd, M., McDonald, J., Schuh, J.: The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Addison-Wesley Professional, Reading (2006)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Siewiorek, D.P., Swarz, R.S.: Reliable Computer Systems \u2014 Design and Evaluation, 3rd edn. AK Peters, Ltd. (1998)","DOI":"10.1201\/9781439863961"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Postel, J. (ed.): Transmission control protocol (1981) DARPA Internet Program. Transmission Control Protocol. In: RFC 793 (1981)","DOI":"10.17487\/rfc0793"},{"issue":"1","key":"7_CR14","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/65.660003","volume":"12","author":"T.J. Kostas","year":"1998","unstructured":"Kostas, T.J., Borella, M.S., Sidhu, I., Schuster, G.M., Grabiec, J., Mahler, J.: Real-Time Voice Over Packet-Switched Networks. IEEE Network\u00a012(1), 18\u201327 (1998)","journal-title":"IEEE Network"},{"key":"7_CR15","unstructured":"Grangetto, M., Cosman, P.: MAP Decoding of Arithmetic Codes With a Forbidden Symbol. In: ACIVS 2002: Advanced Concepts for Intelligent Vision Systems, Belgium (2002)"},{"issue":"5","key":"7_CR16","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/381906.381918","volume":"20","author":"L. Gong","year":"1990","unstructured":"Gong, L.: A Note on Redundancy in Encrypted Messages. ACM SIGCOMM Computer Communication Review\u00a020(5), 18\u201322 (1990)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"7_CR17","unstructured":"Contributing Members of the UPnP Forum: UPnP AV Architecture: 0.83 (2002)"},{"key":"7_CR18","unstructured":"Sipser, M.: Introduction to the Theory of Computation, 2nd edn. Course Technology (2005)"},{"issue":"5","key":"7_CR19","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1016\/S0019-9958(67)91165-5","volume":"10","author":"E.M. Gold","year":"1967","unstructured":"Gold, E.M.: Language Identification in the Limit. Information and Control\u00a010(5), 447\u2013474 (1967)","journal-title":"Information and Control"},{"key":"7_CR20","unstructured":"Haussler, D.: Probably Approximately Correct Learning. In: National Conference on Artificial Intelligence, pp. 1101\u20131108 (1990)"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Case, J., Jain, S., Reischuk, R., Stephan, F., Zeugmann, T.: A Polynomial Time Learner for a Subclass of Regular Patterns. Electronic Colloquium on Computational Complexity (ECCC)\u00a0(38) (2004)","DOI":"10.1007\/978-3-540-39624-6_19"},{"issue":"12","key":"7_CR22","doi-asserted-by":"publisher","first-page":"1245","DOI":"10.1109\/34.106998","volume":"13","author":"S.C. Chan","year":"1991","unstructured":"Chan, S.C., Wong, A.K.C.: Synthesis and Recognition of Sequences. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a013(12), 1245\u20131255 (1991)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"7_CR23","volume-title":"EsTAL: Advances in Natural Language Processing","author":"B. Martins","year":"2004","unstructured":"Martins, B., Silva, M.J.: Spelling Correction for Search Engine Queries. In: EsTAL: Advances in Natural Language Processing, Springer, Spain (2004)"},{"key":"7_CR24","unstructured":"Antunes, C.M., Oliveira, A.L.: Temporal Data Mining: An Overview. In: Workshop on Temporal Data Mining, Conference on Knowledge Discovery and Data Mining (KDD 2001), USA, pp. 1\u201313 (2001)"},{"issue":"3","key":"7_CR25","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1023\/A:1009748302351","volume":"1","author":"H. Mannila","year":"1997","unstructured":"Mannila, H., Toivonen, H., Verkamo, A.I.: Discovery of Frequent Episodes in Event Sequences. Data Mining and Knowledge Discovery\u00a01(3), 259\u2013289 (1997)","journal-title":"Data Mining and Knowledge Discovery"}],"container-title":["Lecture Notes in Computer Science","Service Availability"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68129-8_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T13:30:23Z","timestamp":1631280623000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68129-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540681281","9783540681298"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68129-8_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}