{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:14:32Z","timestamp":1725491672595},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540752936"},{"type":"electronic","value":"9783540752943"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-75294-3_9","type":"book-chapter","created":{"date-parts":[[2007,9,11]],"date-time":"2007-09-11T14:52:08Z","timestamp":1189522328000},"page":"111-122","source":"Crossref","is-referenced-by-count":0,"title":["Error Propagation Monitoring on Windows Mobile-Based Devices"],"prefix":"10.1007","author":[{"given":"Jos\u00e9 Carlos Bregieiro","family":"Ribeiro","sequence":"first","affiliation":[]},{"given":"Bruno Miguel","family":"Lu\u00eds","sequence":"additional","affiliation":[]},{"given":"M\u00e1rio","family":"Zenha-Rela","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","volume-title":"ACM UbiComp","author":"M. Langheinrich","year":"2001","unstructured":"Langheinrich, M.: Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems. In: ACM UbiComp, ACM Press, New York (2001)"},{"key":"9_CR2","unstructured":"Johansson, A., Suri, N.: Error Propagation Profiling of Operating Systems, presented at DSN (2005)"},{"key":"9_CR3","volume-title":"Software fault injection: inoculating programs against errors","author":"J.M. Voas","year":"1998","unstructured":"Voas, J.M., McGraw, G.: Software fault injection: inoculating programs against errors. Wiley Computer Pub., New York (1998)"},{"key":"9_CR4","unstructured":"Wilson, J.: The State and Notifications Broker Part I, MSDN Library (2006)"},{"key":"9_CR5","unstructured":"Avizienis, A., Laprie, J.-C., Randell, B.: Fundamental Concepts of Dependability, LAAS-CNRS N01145 (2001)"},{"key":"9_CR6","unstructured":"IEEE Standard Glossary of Software Engineering Terminology (IEEE Std610.12-1990) (1990)"},{"key":"9_CR7","volume-title":"Black-box testing : techniques for functional testing of software and systems","author":"B. Beizer","year":"1995","unstructured":"Beizer, B.: Black-box testing: techniques for functional testing of software and systems. Wiley, New York, Chichester (1995)"},{"key":"9_CR8","unstructured":"Gu, W.N., Kalbarczyk, Z., Lyer, R.K., Yang, Z.Y.: Characterization of Linux kernel behavior under errors, presented at DSN (2003)"},{"key":"9_CR9","unstructured":"Murphy, B., Levidow, B.: Windows 2000 Dependability. In: Workshop on Dependable Networks and OS (2000)"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Chou, A., Yang, J., Chelf, B., Hallem, S., Engler, D.: An Empirical Study of Operating System Errors, presented at SOSP (2001)","DOI":"10.21236\/ADA419594"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1109\/12.980005","volume":"51","author":"J. Arlat","year":"2002","unstructured":"Arlat, J., Fabre, J.-C., Rodriguez, M., Salles, F.: Dependability of COTS Microkernel-Based Systems. IEEE Trans. on Computers\u00a051, 138\u2013163 (2002)","journal-title":"IEEE Trans. on Computers"},{"key":"9_CR12","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1145\/1165389.945466","volume":"37","author":"M.M. Swift","year":"2003","unstructured":"Swift, M.M., Bershad, B.N., Levy, H.M.: Improving the Reliability of Commodity OS\u2019s. Operating Systems Review\u00a037, 207\u2013222 (2003)","journal-title":"Operating Systems Review"},{"key":"9_CR13","unstructured":"Jun, X., Zbigniew, K., Ravishankar, K.I.: Networked Windows NT System Field Failure Data Analysis (1999)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Albinet, A., Arlat, J., Fabre, J.-C.: Characterization of the Impact of Faulty Drivers on the Robustness of the Linux Kernel, presented at DSN (2004)","DOI":"10.1109\/DSN.2004.1311957"},{"key":"9_CR15","unstructured":"Dur\u00e3es, J., Madeira, H.: Multidimensional Characterization of the Impact of Faulty Drivers on the OS Behavior. IEICE, 2563\u20132570 (2003)"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Kropp, N.P., Koopman, P.J., Siewiorek, D.P.: Automated Robustness Testing of Off the Shelf Software Components. FTCS 98, IEEE (1998)","DOI":"10.1109\/FTCS.1998.689474"},{"key":"9_CR17","unstructured":"Koopman, P., DeVale, J.: Comparing the robustness of POSIX operating systems, presented at FTCS 99 (1999)"},{"key":"9_CR18","unstructured":"Shelton, C.P., Koopman, P., Devale, K.: Robustness testing of the Microsoft Win32 API, presented at DSN (2000)"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Hiller, M., Jhumka, A., Suri, N.: PROPANE: An environment for examining the propagation of errors in software. In: Proceedings of the ACM SIGSOFT 2002 International Symposium on Software Testing and Analysis, p. 81 (2002)","DOI":"10.1145\/566172.566184"},{"key":"9_CR20","unstructured":"Askerdal, \u00d6., Gafvert, M., Hiller, M., Suri, N.: Analyzing the Impact of Data Errors in Safety-Critical Control Systems. IEEE Trans. Inf. Syst. (2003)"},{"key":"9_CR21","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1109\/TC.2004.1275294","volume":"53","author":"M. Hiller","year":"2004","unstructured":"Hiller, M., Jhumka, A., Suri, N.: EPIC: Profiling the propagation and effect of data errors in software. IEEE Trans. on Computers\u00a053, 512\u2013530 (2004)","journal-title":"IEEE Trans. on Computers"},{"key":"9_CR22","unstructured":"Koopman, P.: What\u2019s Wrong With Fault Injection As A Benchmarking Tool?, presented at DSN, Washington (2002)"},{"key":"9_CR23","unstructured":"Ribeiro, J., -Rela, M. Z.: mCrash: a Framework for the Evaluation of Mobile Devices Trustworthiness Properties, presented at CMUS, Portugal (2006)"},{"key":"9_CR24","volume-title":"Effective software test automation: developing an automated software testing tool","author":"K. Li","year":"2004","unstructured":"Li, K., Wu, M.: Effective software test automation: developing an automated software testing tool. Sybex, London (2004)"}],"container-title":["Lecture Notes in Computer Science","Dependable Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75294-3_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:25:53Z","timestamp":1605763553000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75294-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540752936","9783540752943"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75294-3_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}