{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:45:55Z","timestamp":1742913955724,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540733447"},{"type":"electronic","value":"9783540733454"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-73345-4_86","type":"book-chapter","created":{"date-parts":[[2007,8,23]],"date-time":"2007-08-23T15:41:50Z","timestamp":1187883710000},"page":"755-768","source":"Crossref","is-referenced-by-count":0,"title":["A Suggestion for Analysis of Unexpected Obstacles in Embedded System"],"prefix":"10.1007","author":[{"given":"Yasufumi","family":"Shinyashiki","sequence":"first","affiliation":[]},{"given":"Toshiro","family":"Mise","sequence":"additional","affiliation":[]},{"given":"Masaaki","family":"Hashimoto","sequence":"additional","affiliation":[]},{"given":"Keiichi","family":"Katamine","sequence":"additional","affiliation":[]},{"given":"Naoyasu","family":"Ubayashi","sequence":"additional","affiliation":[]},{"given":"Takako","family":"Nakatani","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"86_CR1","unstructured":"Mise, T., Shinyashiki, Y., Hashimoto, M., Ubayashi, N., Nakatani, T.: A Specification Analysis Method for Unexpected Obstacles in Embedded Software (in Japanese). In: Proc. of the FOSE2005, Kindai Kagaku Sha. Japan Society for Software Science and Technology, pp. 227\u2013235 (2005)"},{"key":"86_CR2","unstructured":"Sumi, T., Hirayama, M., Ubayashi, N.: Analysis of the external environment for embedded systems, IPSJ SIG Technical Reports, 2004-SE-146, pp. 33\u201340 (in Japanese) (2004)"},{"key":"86_CR3","unstructured":"Ministry of Economy, Trade and Industry, editor. Report of actual field survey of embedded software, Edition, Ministry of Economy, Trade and Industry (in Japanese) (2005)"},{"key":"86_CR4","doi-asserted-by":"crossref","unstructured":"Crook, R., Lnce, D., Lin, L., Nuseibeh, B.: Security Requirements Engineering: When Anti-Requirements Hit the Fan. In: Proc. of the 10th Anniversary Joint IEEE International Requirements Engineering Conference (RE 2002), pp. 203\u2013205 (2002)","DOI":"10.1109\/ICRE.2002.1048527"},{"key":"86_CR5","unstructured":"Hatanaka, H., Shinyashiki, Y., Mise, T., Kametani, H., Hashimoto, M., Ubayashi, N., Katamine, K., Nakatani, T.: An Analysis of Information Flow Graph based on Conceptual Model of Exceptions in Embedded Software, Technical Report of IEICE 104-431, pp. 19\u201324 (2004)"},{"key":"86_CR6","unstructured":"Shinyashiki, Y., Mise, T., Eura, Y., Hatanaka, H., Hashimoto, M., Ubayashi, N., Katamine, K., Nakatani, T.: A Conceptual Model of Exceptions in Embedded Software. In: Proceedings of Embedded Software Symposium, pp. 8\u201311 (in Japanese) (2004)"},{"key":"86_CR7","unstructured":"Mise, T., Shinyashiki, Y., Eura, Y., Hatanaka, H., Hashimoto, M., Ubayashi, N., Katamine, K., Nakatani, T.: Exception Analysis Matrix for Embedded System Software Specification. In: Proc. IPSJ\/SIGSE Embedded Software Symposium (ESS 2004) (in Japanese) (2004)"},{"key":"86_CR8","doi-asserted-by":"crossref","unstructured":"Mise, T., Shinyashiki, Y., Hashimoto, M., Ubayashi, N., Katamine, K., Nakatani, T.: An Analysis Method with Failure Scenario Matrix for Specifying Unexpected Obstacles in Embedded System. In: The proceeding of the 12TH Asia-Pacific Software Engineering Conference, pp. 447\u2013454 (2005)","DOI":"10.1109\/APSEC.2005.30"},{"key":"86_CR9","unstructured":"Kametani, H., Shinyashiki, Y., Mise, T., Hashimoto, M., Ubayashi, N., Katamine, K., Nakatani, T.: Information Flow Diagram and Analysis Method for Unexpected Obstacle Specification of Embedded Software. In: Proc. of the Knowledge-Based Software Engineering (JCKBSE 2006), pp. 115\u2013124 (2006)"},{"key":"86_CR10","unstructured":"Leveson, N.G.: Fault Tree Analysis. Safeware System Safety and Computers, 317\u2013326 (1995)"},{"key":"86_CR11","unstructured":"Leveson, N.G.: Failure Modes and Effects Analysis. Safeware System Safety and Computers, 341\u2013344 (1995)"},{"key":"86_CR12","unstructured":"Leveson, N.G.: HaZards and Operability Analysis. Safeware System Safety and Computers, 335\u2013341 (1995)"},{"key":"86_CR13","unstructured":"Pentti, H., Atte, H.: Failure Mode and Effects Analysis of Software-based Automation Systems, STUK-YTO-TR 190, p. 35 (2002)"},{"key":"86_CR14","doi-asserted-by":"crossref","unstructured":"Dehlinger, J., Lutz, R. R. (eds.): Software Fault Tree Analysis for Product Lines. In: Proceedings of the Eighth IEEE International Symposium on High Assurance Systems Engineering, pp. 12\u201321 (2004)","DOI":"10.1109\/HASE.2004.1281726"},{"key":"86_CR15","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1007\/978-1-4471-0823-8","volume-title":"System Safety: Hazop and Software Hazop","author":"F. Redmill","year":"1999","unstructured":"Redmill, F., Chudleigh, M., Catmur, J.: System Safety: Hazop and Software Hazop, p. 248. John Wiley & Sons Ltd, New York (1999)"},{"issue":"1","key":"86_CR16","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MS.2003.1159030","volume":"20","author":"I. Alexander","year":"2003","unstructured":"Alexander, I.: Misuse cases, use cases with hositile intent. IEEE Software\u00a020(1), 55\u201366 (2003)","journal-title":"IEEE Software"},{"issue":"10","key":"86_CR17","doi-asserted-by":"publisher","first-page":"978","DOI":"10.1109\/32.879820","volume":"26","author":"A.V. Lamsweerde","year":"2000","unstructured":"Lamsweerde, A.V., Letier, E.: Handling Obstacles in Goal-Oriented Requirements Engineering. IEEE Transactions on Software Engineering\u00a026(10), 978\u20131005 (2000)","journal-title":"IEEE Transactions on Software Engineering"},{"volume-title":"Handbook on Architecture of Information Systems","year":"1998","key":"86_CR18","unstructured":"Bemus, P., Mertins, K., Schmidt, G. (eds.): Handbook on Architecture of Information Systems. Springer, Heidelberg (1998)"},{"key":"86_CR19","unstructured":"Mise, T., Hashimoto, M., Katamine, K., Shinyashiki, Y., Ubayashi, N., Nakatani, T.: A Method for Extracting Unexpected Scenarios of Embedded Systems. In: Proc. of the Knowledge-Based Software Engineering (JCKBSE 2006), pp. 41\u201350 (2006)"}],"container-title":["Lecture Notes in Computer Science","Human Interface and the Management of Information. Methods, Techniques and Tools in Information Design"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73345-4_86","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T16:13:38Z","timestamp":1737389618000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73345-4_86"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540733447","9783540733454"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73345-4_86","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}