{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:56:26Z","timestamp":1771700186565,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642008665","type":"print"},{"value":"9783642008672","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00867-2_4","type":"book-chapter","created":{"date-parts":[[2009,3,2]],"date-time":"2009-03-02T14:04:21Z","timestamp":1236002661000},"page":"57-84","source":"Crossref","is-referenced-by-count":16,"title":["Design and Verification of Fault-Tolerant Components"],"prefix":"10.1007","author":[{"given":"Miaomiao","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Zhiming","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Charles","family":"Morisset","sequence":"additional","affiliation":[]},{"given":"Anders P.","family":"Ravn","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"4_CR1","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/0304-3975(91)90224-P","volume":"82","author":"M. Abadi","year":"1991","unstructured":"Abadi, M., Lamport, L.: The existence of refinement mapping. Theoretical Computer Science\u00a082(2), 253\u2013284 (1991)","journal-title":"Theoretical Computer Science"},{"issue":"2","key":"4_CR2","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/0304-3975(94)90010-8","volume":"126","author":"R. Alur","year":"1994","unstructured":"Alur, R., Dill, D.L.: A Theory of Timed Automata. Theoretical Computer Science\u00a0126(2), 183\u2013235 (1994)","journal-title":"Theoretical Computer Science"},{"key":"4_CR3","unstructured":"Avizienis, A., Laprie, J.-C., Randell, B.: Fundamental Concepts of Dependability. In: Proceedings of the 3rd IEEE Information Survivability Workshop (ISW 2000), pp. 7\u201312 (2000)"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-540-30080-9_7","volume-title":"Formal Methods for the Design of Real-Time Systems","author":"G. Behrmann","year":"2004","unstructured":"Behrmann, G., David, A., Larsen, K.G.: A tutorial on uppaal. In: Bernardo, M., Corradini, F. (eds.) SFM-RT 2004. LNCS, vol.\u00a03185, pp. 200\u2013236. Springer, Heidelberg (2004)"},{"issue":"4","key":"4_CR5","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1002\/stvr.258","volume":"12","author":"C. Bernardeschi","year":"2002","unstructured":"Bernardeschi, C., Fantechi, A., Gnesi, S.: Model checking fault tolerant systems. Journal of Software Testing, Verification and Reliability (STVR)\u00a012(4), 251\u2013275 (2002)","journal-title":"Journal of Software Testing, Verification and Reliability (STVR)"},{"issue":"5","key":"4_CR6","doi-asserted-by":"publisher","first-page":"1512","DOI":"10.1145\/186025.186051","volume":"16","author":"E.M. Clarke","year":"1992","unstructured":"Clarke, E.M., Grumberg, O., Long, D.E.: Model Checking and Abstraction. ACM Transations on Programming Languadge and Ststems\u00a016(5), 1512\u20131542 (1992)","journal-title":"ACM Transations on Programming Languadge and Ststems"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/3-540-45657-0_3","volume-title":"Computer Aided Verification","author":"P. Cousot","year":"2002","unstructured":"Cousot, P., Cousot, R.: On abstraction in software verification. In: Brinksma, E., Larsen, K.G. (eds.) CAV 2002. LNCS, vol.\u00a02404, pp. 37\u201356. Springer, Heidelberg (2002)"},{"issue":"2","key":"4_CR8","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1145\/244795.244800","volume":"19","author":"D. Dams","year":"1997","unstructured":"Dams, D., Gerth, R., Grumberg, O.: Abstract interpretation of reactive systems. ACM Transactions on Programming Languages and Systems (TOPLAS)\u00a019(2), 253\u2013291 (1997)","journal-title":"ACM Transactions on Programming Languages and Systems (TOPLAS)"},{"issue":"3","key":"4_CR9","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1023\/A:1008764923992","volume":"16","author":"M.C.A. Devillers","year":"2000","unstructured":"Devillers, M.C.A., Griffioen, W.O.D., Romijn, J.M.T., Vaandrager, F.W.: Verification of a Leader Election Protocol - Formal Methods Applied to IEEE 1394. Formal Methods in System Design\u00a016(3), 307\u2013320 (2000)","journal-title":"Formal Methods in System Design"},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1145\/1176887.1176923","volume-title":"Proceedings of the 6th Annual ACM & IEEE Conference on Embedded Software (EMSOFT 2006)","author":"B. Gebremichael","year":"2006","unstructured":"Gebremichael, B., Vaandrager, F.W., Zhang, M.: Analysis of the Zeroconf Protocol Using UPPAAL. In: Proceedings of the 6th Annual ACM & IEEE Conference on Embedded Software (EMSOFT 2006), pp. 242\u2013251. ACM Press, New York (2006)"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Gnesi, S., Lenzini, G., Martinelli, F.: Logical specification and analysis of fault tolerant systems through partial model checking. In: Proceedings of the International Workshop on Software Verification and Validation (SVV 2003). Electronic Notes in Theoretical Computer Science, vol.\u00a0118, pp. 57\u201370 (2003)","DOI":"10.1016\/j.entcs.2004.09.032"},{"key":"4_CR12","unstructured":"Jensen, H.E.: Abstraction-Based Verification of Distributed Systems. Phd thesis, Department of Computer Science, Aalborg University, Denmark (June 1999)"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/3-540-45352-0_4","volume-title":"Formal Techniques in Real-Time and Fault-Tolerant Systems","author":"H.E. Jensen","year":"2000","unstructured":"Jensen, H.E., Larsen, K.G., Skou, A.: Scaling up uppaal. In: Joseph, M. (ed.) FTRTFT 2000. LNCS, vol.\u00a01926, pp. 19\u201330. Springer, Heidelberg (2000)"},{"key":"4_CR14","volume-title":"Design and analysis of fault-tolerant digital systems","author":"B.W. Johnson","year":"1989","unstructured":"Johnson, B.W.: Design and analysis of fault-tolerant digital systems. Addison-Wesley Publishing, Reading (1989)"},{"issue":"1","key":"4_CR15","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1145\/314602.314605","volume":"21","author":"Z. Liu","year":"1999","unstructured":"Liu, Z., Joseph, M.: Specification and verification of fault-tolerance timing, and scheduling. ACM Transactions on Programming Languages and Systems\u00a021(1), 46\u201389 (1999)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"4_CR16","first-page":"220","volume-title":"FTCS 1996","author":"Z. Liu","year":"1996","unstructured":"Liu, Z., Joseph, M.: Verification of fault-tolerance and real time. In: FTCS 1996, pp. 220\u2013229. IEEE Computer Society Press, Los Alamitos (1996)"},{"issue":"1","key":"4_CR17","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/BF01384313","volume":"6","author":"C. Loiseaux","year":"1995","unstructured":"Loiseaux, C., Graf, S., Sifakis, J., Bouajjani, A., Bensalem, S.: Property Preserving Abstractions for the Verification of Concurrent Systems. Formal Methods in System Design\u00a06(1), 11\u201344 (1995)","journal-title":"Formal Methods in System Design"},{"key":"4_CR18","first-page":"4","volume-title":"Proceedings of the 3rd International Conference on Requirements Engineering","author":"F. Schneider","year":"1998","unstructured":"Schneider, F., Easterbrook, S.M., Callahan, J.R., Holzmann, G.J.: Validating requirements for fault tolerant systems using model checking. In: Proceedings of the 3rd International Conference on Requirements Engineering, pp. 4\u201313. IEEE Computer Society Press, Los Alamitos (1998)"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Simons, D.P.L., Stoelinga, M.: Mechanical verification of the IEEE 1394- a root contention protocol using Uppaal2k. International Journal on Software Tools for Technlogy Transfer, 469\u2013485 (2001)","DOI":"10.1007\/s100090100059"},{"key":"4_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-48778-6_4","volume-title":"Formal Methods for Real-Time and Probabilistic Systems","author":"M.I.A. Stoelinga","year":"1999","unstructured":"Stoelinga, M.I.A., Vaandrager, F.W.: Root contention in IEEE 1394. In: Katoen, J.-P. (ed.) AMAST-ARTS 1999, ARTS 1999, and AMAST-WS 1999. LNCS, vol.\u00a01601, pp. 53\u201374. Springer, Heidelberg (1999)"},{"key":"4_CR21","unstructured":"Yorav, K.: Exploiting syntactic structure for automatic verification. PhD thesis, The Technion, Israel Insitute of Technology (2000)"}],"container-title":["Lecture Notes in Computer Science","Methods, Models and Tools for Fault Tolerance"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00867-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,16]],"date-time":"2020-05-16T07:29:02Z","timestamp":1589614142000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00867-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642008665","9783642008672"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00867-2_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}