{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T05:37:12Z","timestamp":1737178632716,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540724254"},{"type":"electronic","value":"9783540724261"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72426-1_9","type":"book-chapter","created":{"date-parts":[[2007,7,3]],"date-time":"2007-07-03T09:12:51Z","timestamp":1183453971000},"page":"96-108","source":"Crossref","is-referenced-by-count":1,"title":["Safety Critical Software Process Improvement by Multi-objective Optimization Algorithms"],"prefix":"10.1007","author":[{"given":"Mario","family":"Brito","sequence":"first","affiliation":[]},{"given":"John","family":"May","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"IEC61508. 1998-2000. Functional safety of electrical\/ electronic\/ programmable electronic safety-related systems parts 1-7. Published by the International Electrotechnical Commission (IEC), Geneva Switzerland."},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/11875567_9","volume-title":"Computer Safety, Reliability, and Security","author":"M. Brito","year":"2006","unstructured":"Brito, M., May, J.: Gaining Confidence in the Software Development Process Using Expert Systems. In: G\u00f3rski, J. (ed.) SAFECOMP 2006. LNCS, vol.\u00a04166, pp. 113\u2013126. Springer, Heidelberg (2006)"},{"issue":"3","key":"9_CR3","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1162\/evco.1994.2.3.221","volume":"2","author":"N. Srinival","year":"1994","unstructured":"Srinival, N., Deb, K.: Multi-objective function optimization using non-dominated sorting genetic algorithms. Evolutionary Computational Journal\u00a02(3), 221\u2013248 (1994)","journal-title":"Evolutionary Computational Journal"},{"key":"9_CR4","volume-title":"Genetic Algorithms in Search, Optimization & Machine Learning","author":"D.E. Goldberg","year":"1989","unstructured":"Goldberg, D.E.: Genetic Algorithms in Search, Optimization & Machine Learning. Addison Wesley, Reading (1989)"},{"key":"9_CR5","unstructured":"Hugin A\/S: http:\/\/www.hugin.com"},{"key":"9_CR6","unstructured":"Hugin Expert A\/S. 1990-2005. Hugin API Reference Manual version 6.4"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Hall, P., et al.: Integrity Prediction during Software Development. In: Safety of Computer Control Systems (SAFECOMP\u201992), Computer Systems in Safety-Critical Applications, Procs of the IFAC Symposium, Zurich, Switzerland, October 28-30, 1992, pp. 239\u2013244 (1992)","DOI":"10.1016\/B978-0-08-041893-3.50044-6"},{"key":"9_CR8","first-page":"173","volume-title":"Proceedings of the 14th International Conference on Computer Safety (SafeComp\u201995)","author":"B. Littlewood","year":"1995","unstructured":"Littlewood, B., Wright, D.R.: Proceedings of the 14th International Conference on Computer Safety (SafeComp\u201995), pp. 173\u2013190. Springer, Heidelberg (1995)"},{"key":"9_CR9","unstructured":"Delic, K.A., Mazzanti, F., Strigini, L.: Formalising a software safety case via belief networks. In: Proceedings DCCA-6, Sixth IFIP International Working Conference on Dependable Computing for critical Applications, Garmisch-Partenkirchen, Germany (1997)"},{"issue":"1","key":"9_CR10","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1049\/ip-sen:19984895","volume":"145","author":"N.E. Fenton","year":"1998","unstructured":"Fenton, N.E., et al.: Assessing dependability of safety critical systems using diverse evidence. IEE Proceedings Software Engineering\u00a0145(1), 35\u201339 (1998)","journal-title":"IEE Proceedings Software Engineering"},{"key":"9_CR11","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511840609","volume-title":"Uncertainty: A Guide to Dealing with Uncertainty in Quantitative Risk and Policy Analysis","author":"M.G. Morgan","year":"1990","unstructured":"Morgan, M.G., Henrion, M.: Uncertainty: A Guide to Dealing with Uncertainty in Quantitative Risk and Policy Analysis. Cambridge University Press, Cambridge (1990)"},{"issue":"336","key":"9_CR12","doi-asserted-by":"publisher","first-page":"783","DOI":"10.2307\/2284229","volume":"66","author":"L.J. Savage","year":"1990","unstructured":"Savage, L.J.: Elicitation of Personal Probabilisties and Expectations. Journal of the American Statistical Association\u00a066(336), 783\u2013801 (1990)","journal-title":"Journal of the American Statistical Association"},{"issue":"1","key":"9_CR13","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1023\/A:1016600602423","volume":"9","author":"T. Cockram","year":"2001","unstructured":"Cockram, T.: Gaining confidence in software Inspection using a Bayesian Belief Model. Software Quality Journal\u00a09(1), 31\u201342 (2001)","journal-title":"Software Quality Journal"},{"key":"9_CR14","volume-title":"Probabilistic reasoning in intelligent systems","author":"J. Pearl","year":"1988","unstructured":"Pearl, J.: Probabilistic reasoning in intelligent systems. Morgan Kaufmann, San Francisco (1988)"},{"issue":"3","key":"9_CR15","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1214\/ss\/1177010888","volume":"8","author":"D.J. Spiegelhalter","year":"1993","unstructured":"Spiegelhalter, D.J., et al.: Bayesian Analysis in Expert Systems. Journal of Statistical Science\u00a08(3), 219\u2013283 (1993)","journal-title":"Journal of Statistical Science"},{"key":"9_CR16","unstructured":"Fonseca, C.M., Fleming, P.J.: Genetic algorithms for multi-objective optimization: Formulation, discussion and generalization. In: Proceedings of the Fifth International Conference on Genetic Algorithms, pp. 416\u2013423 (1993)"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Horn, J., Nafploitis, N., Goldberg, D.: A niched Pareto genetic algorthm for multi-objective optimization. In: Procs 1st IEEE Conf. on Evolutionary Computation, pp. 82\u201387 (1994)","DOI":"10.1109\/ICEC.1994.350037"},{"key":"9_CR18","unstructured":"Zitzler, E., Thiele, L.: An Evolutionary algorithm for multi-objective optimization: The strength Pareto approach. Technical report 43, Zurich, Switzerland: Computer Engineering and Networks Laboratory (TIK), Swiss Federal Institute of Technology (ETH) (1998)"},{"key":"9_CR19","volume-title":"Functional Safety - A straightforward guide to applying IEC61508 and related standards","author":"D. Smith","year":"2004","unstructured":"Smith, D., Simpson, K.: Functional Safety - A straightforward guide to applying IEC61508 and related standards, 2nd edn. Elsevier, Amsterdam (2004)","edition":"2"},{"key":"9_CR20","unstructured":"Rivett, R.S.: Emerging Software Best Practice and how to be compliant. In: Proceedings of the Sixth International EAEC Congress (1997)"},{"key":"9_CR21","volume-title":"Simulated Annealing and Boltzmann Machines - A Stochastic Approach to Combinatorial Optimization and Neural Computing","author":"E. Aarts","year":"1989","unstructured":"Aarts, E., Korst, J.: Simulated Annealing and Boltzmann Machines - A Stochastic Approach to Combinatorial Optimization and Neural Computing. John Wiley & Sons, Chichester (1989)"}],"container-title":["Lecture Notes in Computer Science","Software Process Dynamics and Agility"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72426-1_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T03:42:22Z","timestamp":1737171742000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72426-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540724254","9783540724261"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72426-1_9","relation":{},"subject":[]}}