{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T05:31:44Z","timestamp":1738387904996,"version":"3.35.0"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540876977"},{"type":"electronic","value":"9783540876984"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-87698-4_13","type":"book-chapter","created":{"date-parts":[[2008,9,19]],"date-time":"2008-09-19T19:53:29Z","timestamp":1221854009000},"page":"126-138","source":"Crossref","is-referenced-by-count":4,"title":["Analysis of Nested CRC with Additional Net Data in Communication"],"prefix":"10.1007","author":[{"given":"Tina","family":"Mattes","sequence":"first","affiliation":[]},{"given":"Frank","family":"Schiller","sequence":"additional","affiliation":[]},{"given":"Annemarie","family":"M\u00f6rwald","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Honold","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"International Electronical Comission: Functional Safety of Electrical\/Electronic\/Programmable Electronic Safety-related Systems. (IEC 61508) (2005)"},{"key":"13_CR2","unstructured":"International Organization for Standardization, International Electrotechnical Commission (ISO\/IEC): Information Technology - Open Systems Interconnection - Basic Reference Model: Basic Model (ISO\/IEC 7498-1) (1996)"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-540-75101-4_32","volume-title":"Computer Safety, Reliability, and Security","author":"T. Mattes","year":"2007","unstructured":"Mattes, T., Pfahler, J., Schiller, F., Honold, T.: Analysis of Combinations of CRC in Industrial Communication. In: Saglietti, F., Oster, N. (eds.) SAFECOMP 2007. LNCS, vol.\u00a04680, pp. 329\u2013341. Springer, Heidelberg (2007)"},{"key":"13_CR4","volume-title":"Error Correcting Codes","author":"W. Peterson","year":"1996","unstructured":"Peterson, W., Weldon, E.J.: Error Correcting Codes. MIT Press, Cambridge (1996)"},{"key":"13_CR5","first-page":"57","volume":"14","author":"F. Schiller","year":"2006","unstructured":"Schiller, F., Mattes, T.: An Efficient Method to Evaluate CRC-Polynomials for Safety-Critical Communication. Journal of Applied Computer Science\u00a014, 57\u201380 (2006)","journal-title":"Journal of Applied Computer Science"},{"key":"13_CR6","volume-title":"Theory of Error-Correcting Codes","author":"F.J. Mac Williams","year":"1991","unstructured":"Mac Williams, F.J., Sloane, N.J.A.: Theory of Error-Correcting Codes. North-Holland Mathematical Library, Amsterdam (1991)"},{"key":"13_CR7","volume-title":"Codierung zur Fehlererkennung und Fehlerkorrektur","author":"P. Sweeney","year":"1996","unstructured":"Sweeney, P.: Codierung zur Fehlererkennung und Fehlerkorrektur. MIT Press, Cambridge (1996)"},{"key":"13_CR8","unstructured":"Mattes, T.: Untersuchung zur effizienten Bestimmung der G\u00fcte von Polynomen f\u00fcr CRC-Codes. University of Trier, Siemens AG, Nuremberg (2004) (in German)"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Mattes, T.: Analysis of Nested CRC with Additional Net Data by Stochastic Automata. In: 7th IEEE International Workshop on Factory Communication Systems Communication in Automation, Dresden, Germany, May 20-23, pp. 295\u2013304 (2008)","DOI":"10.1109\/WFCS.2008.4638714"},{"key":"13_CR10","unstructured":"M\u00f6rwald, A.: Analyse der Verschachtelung von CRC-Verfahren in der industriellen Kommunikation. TU M\u00fcnchen (2007)"},{"key":"13_CR11","unstructured":"Schiller, F., Mattes, T., B\u00fcttner, H., Sachs, J.: A New Method to Obtain Sufficient Independency of Nested Cyclic Redundancy Checks. In: 5th International Conference Safety of Industrial Automated Systems, SIAS 2007, Tokyo, Japan, pp. 149\u2013154 (2007)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87698-4_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:37:02Z","timestamp":1738370222000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87698-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540876977","9783540876984"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87698-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}