{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T00:49:22Z","timestamp":1740185362467,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642135491"},{"type":"electronic","value":"9783642135507"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13550-7_6","type":"book-chapter","created":{"date-parts":[[2010,6,15]],"date-time":"2010-06-15T15:14:12Z","timestamp":1276614852000},"page":"83-96","source":"Crossref","is-referenced-by-count":3,"title":["Practical Limits on Software Dependability: A Case Study"],"prefix":"10.1007","author":[{"given":"Patrick J.","family":"Graydon","sequence":"first","affiliation":[]},{"given":"John C.","family":"Knight","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Yin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"AdaCore: GNAT Pro High-Integrity Family. http:\/\/www.adacore.com\/-home\/products\/gnatpro\/development_solutions\/safety-critical\/","key":"6_CR1"},{"issue":"2","key":"6_CR2","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/s10817-009-9123-z","volume":"42","author":"E. Alkassar","year":"2009","unstructured":"Alkassar, E., Hillebrand, M.A., Leinenbach, D.C., Schirmer, N.W., Starostin, A., Tsyban, A.: Balancing the load. Journal of Automated Reasoning\u00a042(2), 389\u2013454 (2009)","journal-title":"Journal of Automated Reasoning"},{"doi-asserted-by":"crossref","unstructured":"Alkassar, E., Schirmer, N., Starostin, A.: Formal pervasive verification of a paging mechanism. In: Tools and Algorithms for the Construction and Analysis of Systems, pp. 109\u2013123 (2008)","key":"6_CR3","DOI":"10.1007\/978-3-540-78800-3_9"},{"key":"6_CR4","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/ARITH.2007.20","volume-title":"Proceedings of the 18th IEEE Symposium on Computer Arithmetic (ARITH 2007)","author":"S. Boldo","year":"2007","unstructured":"Boldo, S., Filliatre, J.C.: Formal verification of floating-point programs. In: Proceedings of the 18th IEEE Symposium on Computer Arithmetic (ARITH 2007), pp. 187\u2013194. IEEE Computer Society Press, Washington (2007)"},{"issue":"5","key":"6_CR5","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/123041.123054","volume":"16","author":"Ricky W. Butler","year":"1991","unstructured":"Butler, R., Finelli, G.: The infeasibility of experimental quantification of life-critical software reliability. IEEE Trans. on Software Engineering, 66\u201376 (1991)","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"doi-asserted-by":"crossref","unstructured":"Graydon, P.J., Knight, J.C.: Software process synthesis in assurance based development of dependable systems. In: Proceedings of the 8th European Dependable Computing Conference (EDCC), Valencia, Spain (April 2010)","key":"6_CR6","DOI":"10.1109\/EDCC.2010.19"},{"unstructured":"Greenwell, W., Knight, J., Holloway, C., Pease, J.: A taxonomy of fallacies in system safety arguments. In: Proceedings of the 2006 International System Safety Conference (ISSC 2006), Albuquerque, NM, USA (July 2006)","key":"6_CR7"},{"unstructured":"Hanks, K., Knight, J.: Improving communication of critical domain knowledge in high-consequence software development: An empirical study. In: Proceedings of the 21st International System Safety Conference, Ottawa, Canada (August 2003)","key":"6_CR8"},{"unstructured":"Hayhurst, K.J., Veerhusen, D.S., Chilenski, J.J., Rierson, L.K.: A practical tutorial on modified condition \/ decision coverage. Technical Memorandum TM-2001-210876, NASA, Hampton, VA (May 2001)","key":"6_CR9"},{"issue":"1","key":"6_CR10","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TSE.1980.230208","volume":"6","author":"K.L. Heninger","year":"1980","unstructured":"Heninger, K.L.: Specifying software requirements for complex systems: New techniques and their application. IEEE Transactions on Software Engineering\u00a06(1), 2\u201313 (1980)","journal-title":"IEEE Transactions on Software Engineering"},{"doi-asserted-by":"crossref","unstructured":"Kelly, T.: A systematic approach to safety case management. In: Proc. of the Society for Automotive Engineers 2004 World Congress, Detroit, MI, USA (2004)","key":"6_CR11","DOI":"10.4271\/2004-01-1779"},{"unstructured":"Kelly, T.: Reviewing assurance arguments \u2014 a step-by-step approach. In: Proceedings of the Workshop on Assurance Cases for Security \u2014 The Metrics Challenge, Dependable Systems and Networks (DSN) (July 2007)","key":"6_CR12"},{"doi-asserted-by":"crossref","unstructured":"Klein, G., Elphinstone, K., Heiser, G., Andronick, J., Cock, D., Derrin, P., Elkaduwe, D., Engelhardt, K., Kolanski, R., Norrish, M., Sewell, T., Tuch, H., Winwood, S.: seL4: Formal verification of an OS kernel. In: Proc. of the 22nd ACM Symposium on Operating Systems Principles, Big Sky, MT, USA (October 2009)","key":"6_CR13","DOI":"10.1145\/1629575.1629596"},{"issue":"11","key":"6_CR14","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/163359.163366","volume":"36","author":"J.C. Knight","year":"1993","unstructured":"Knight, J.C., Myers, E.A.: An improved inspection technique. Communications of the ACM\u00a036(11), 51\u201361 (1993)","journal-title":"Communications of the ACM"},{"doi-asserted-by":"crossref","unstructured":"Laprie, J.C., Le Lann, G., Morganti, M., Rushby, J.: Panel session on limits in dependability. In: Highlights from Twenty-Five Years, Twenty-Fifth International Symposium on Fault-Tolerant Computing, June 1995, pp. 608\u2013613 (1995)","key":"6_CR15","DOI":"10.1109\/FTCS.1993.627363"},{"doi-asserted-by":"crossref","unstructured":"Littlewood, B.: Limits to dependability assurance \u2014 a controversy revisited. In: Companion to the proceedings of the 29th International Conference on Software Engineering (ICSE 2007), Washington, DC, USA (2007)","key":"6_CR16","DOI":"10.1109\/ICSECOMPANION.2007.47"},{"issue":"11","key":"6_CR17","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/163359.163373","volume":"36","author":"B. Littlewood","year":"1993","unstructured":"Littlewood, B., Strigini, L.: Validation of ultrahigh dependability for software-based systems. Communications of the ACM\u00a036(11), 69\u201380 (1993)","journal-title":"Communications of the ACM"},{"unstructured":"Lutz, R.R.: Analyzing software requirements errors in safety-critical, embedded systems. In: Proc. of the IEEE International Symposium on Requirements Engineering (RE 1993), San Diego, CA, USA (January 1993)","key":"6_CR18"},{"unstructured":"SRI International: PVS specification and verification system, http:\/\/pvs.csl.sri.com\/","key":"6_CR19"},{"unstructured":"Wasson, K.S.: CLEAR requirements: improving validity using cognitive linguistic elicitation and representation. Ph.D. thesis, University of Virginia, Charlottesville, VA, USA (May 2006)","key":"6_CR20"},{"key":"6_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-540-87698-4_26","volume-title":"Computer Safety, Reliability, and Security","author":"X. Yin","year":"2008","unstructured":"Yin, X., Knight, J., Nguyen, E., Weimer, W.: Formal verification by reverse synthesis. In: Harrison, M.D., Sujan, M.-A. (eds.) SAFECOMP 2008. LNCS, vol.\u00a05219, pp. 305\u2013319. Springer, Heidelberg (2008)"},{"doi-asserted-by":"crossref","unstructured":"Yin, X., Knight, J.C., Weimer, W.: Exploiting refactoring in formal verification. In: Proc. of the 39th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2009), Lisbon, Portugal (June 2009)","key":"6_CR22","DOI":"10.1109\/DSN.2009.5270355"}],"container-title":["Lecture Notes in Computer Science","Reliable Software Technologiey \u2013 Ada-Europe 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13550-7_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T00:04:20Z","timestamp":1740182660000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13550-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642135491","9783642135507"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13550-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}