{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:46:07Z","timestamp":1742913967159,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642242694"},{"type":"electronic","value":"9783642242700"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24270-0_31","type":"book-chapter","created":{"date-parts":[[2011,9,7]],"date-time":"2011-09-07T10:51:44Z","timestamp":1315392704000},"page":"423-436","source":"Crossref","is-referenced-by-count":6,"title":["Model-Based Multi-objective Safety Optimization"],"prefix":"10.1007","author":[{"given":"Matthias","family":"G\u00fcdemann","sequence":"first","affiliation":[]},{"given":"Frank","family":"Ortmeier","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/11925040_8","volume-title":"Leveraging Applications of Formal Methods","author":"P.A. Abdulla","year":"2004","unstructured":"Abdulla, P.A., Deneux, J., St\u00e5lmarck, G., \u00c5gren, H., \u00c5kerlund, O.: Designing safe, reliable systems using Scade. In: Margaria, T., Steffen, B. (eds.) ISoLA 2004. LNCS, vol.\u00a04313, pp. 115\u2013129. Springer, Heidelberg (2004)"},{"key":"31_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-540-88387-6_27","volume-title":"Automated Technology for Verification and Analysis","author":"E. B\u00f6de","year":"2008","unstructured":"B\u00f6de, E., Peikenkamp, T., Rakow, J., Wischmeyer, S.: Model based importance analysis for minimal cut sets. In: Cha, S(S.), Choi, J.-Y., Kim, M., Lee, I., Viswanathan, M. (eds.) ATVA 2008. LNCS, vol.\u00a05311, pp. 303\u2013317. Springer, Heidelberg (2008)"},{"key":"31_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-540-39878-3_5","volume-title":"Computer Safety, Reliability, and Security","author":"M. Bozzano","year":"2003","unstructured":"Bozzano, M., Villafiorita, A.: Improving system reliability via model checking: the FSAP\/NuSMV-SA safety analysis platform. In: Anderson, S., Felici, M., Littlewood, B. (eds.) SAFECOMP 2003. LNCS, vol.\u00a02788, pp. 49\u201362. Springer, Heidelberg (2003)"},{"key":"31_CR4","unstructured":"Bozzano, M., Cimatti, A., Katoen, J.-P., Nguyen, V.Y., Noll, T., Roveri, M.: Model-based codesign of critical embedded systems. In: Proceedings of ACES-MB, vol.\u00a0507, pp. 87\u201391. CEUR Workshop Proceedings (2009)"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Bozzano, M., Cimatti, A., Katoen, J.-P., Nguyen, V.Y., Noll, T., Roveri, M.: Safety, dependability, and performance analysis of extended AADL models. The Computer Journal (2010)","DOI":"10.1093\/comjnl\/bxq024"},{"key":"31_CR6","first-page":"13","volume":"9","author":"J. Branke","year":"2005","unstructured":"Branke, J., Schmidt, C.: Faster convergence by means of fitness estimation. Soft Computing - A Fusion of Foundations, Methodologies and Applications\u00a09, 13\u201320 (2005)","journal-title":"Soft Computing - A Fusion of Foundations, Methodologies and Applications"},{"key":"31_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1007\/978-3-540-30217-9_73","volume-title":"Parallel Problem Solving from Nature - PPSN VIII","author":"J. Branke","year":"2004","unstructured":"Branke, J., Deb, K., Dierolf, H., Osswald, M.: Finding knees in multi-objective optimization. In: Yao, X., Burke, E.K., Lozano, J.A., Smith, J., Merelo-Guerv\u00f3s, J.J., Bullinaria, J.A., Rowe, J.E., Ti\u0148o, P., Kab\u00e1n, A., Schwefel, H.-P. (eds.) PPSN 2004. LNCS, vol.\u00a03242, pp. 722\u2013731. Springer, Heidelberg (2004)"},{"key":"31_CR8","volume-title":"Proceedings of the QEST","author":"L. Grunske","year":"2007","unstructured":"Grunske, L., Colvin, R., Winter, K.: Probabilistic model-checking support for FMEA. In: Proceedings of the QEST. IEEE, Los Alamitos (2007)"},{"issue":"5","key":"31_CR9","doi-asserted-by":"publisher","first-page":"678","DOI":"10.1016\/j.jss.2006.08.014","volume":"80","author":"L. Grunske","year":"2007","unstructured":"Grunske, L.: Early quality prediction of component-based systems - a generic framework. Journal of Systems and Software\u00a080(5), 678\u2013686 (2007); Component-Based Software Engineering of Trustworthy Embedded Systems","journal-title":"Journal of Systems and Software"},{"key":"31_CR10","unstructured":"G\u00fcdemann, M., Ortmeier, F., Reif, W.: Computing ordered minimal critical sets. In: Proceedings of FORMS \/ FORMAT (2008)"},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"G\u00fcdemann, M., Ortmeier, F.: A framework for qualitative and quantitative model-based safety analysis. In: Proceedings of HASE 2010 (2010)","DOI":"10.1109\/HASE.2010.24"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"G\u00fcdemann, M., Ortmeier, F.: Probabilistic model-based safety analysis. In: Proceedings of QAPL. EPTCS (2010)","DOI":"10.4204\/EPTCS.28.8"},{"key":"31_CR13","doi-asserted-by":"crossref","unstructured":"G\u00fcdemann, M., Ortmeier, F.: Quantitative model-based safety analysis: A case study. In: Proceedings of SICHERHEIT. LNI (2010)","DOI":"10.4204\/EPTCS.28.8"},{"key":"31_CR14","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/BF01211866","volume":"6","author":"H. Hansson","year":"1994","unstructured":"Hansson, H., Jonsson, B.: A logic for reasoning about time and reliability. Formal Aspects of Computing\u00a06, 102\u2013111 (1994)","journal-title":"Formal Aspects of Computing"},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"Katoen, J.-P., Zapreev, I.S., Hahn, E.M., Hermanns, H., Jansen, D.N.: The ins and outs of the probabilistic model checker MRMC. Performance Evaluation, Corrected Proof. 167\u2013176 (2010) (in press)","DOI":"10.1109\/QEST.2009.11"},{"key":"31_CR16","unstructured":"Kletz, T.A.: Hazop and HAZAN notes on the identification and assessment of hazards. Technical report, Inst. of Chemical Engineers, Rugby, England (1986)"},{"key":"31_CR17","unstructured":"Klose, J., Thums, A.: The STATEMATE reference model of the reference case study \u2018Verkehrsleittechnik\u2019. Technical Report 2002-01, Universit\u00e4t Augsburg (2002)"},{"key":"31_CR18","first-page":"200","volume-title":"Prism: Probabilistic symbolic model checker","author":"M. Kwiatkowska","year":"2002","unstructured":"Kwiatkowska, M., Norman, G., Parker, D.: Prism: Probabilistic symbolic model checker, pp. 200\u2013204. Springer, Heidelberg (2002)"},{"key":"31_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44719-9_1","volume-title":"Evolutionary Multi-Criterion Optimization","author":"K. Miettinen","year":"2001","unstructured":"Miettinen, K.: Some methods for nonlinear multi-objective optimization. In: Zitzler, E., Deb, K., Thiele, L., Coello Coello, C.A., Corne, D.W. (eds.) EMO 2001. LNCS, vol.\u00a01993, pp. 1\u201320. Springer, Heidelberg (2001)"},{"key":"31_CR20","doi-asserted-by":"crossref","unstructured":"Nain, P.K.S., Deb, K.: Computationally effective search and optimization procedure using coarse to fine approximations. In: Proceedings of CEC (2003)","DOI":"10.1109\/CEC.2003.1299929"},{"key":"31_CR21","unstructured":"Nissen, S.: Implementation of a fast artificial neural network library (fann). Technical report, Department of Computer Science University of Copenhagen, DIKU (2003), http:\/\/fann.sf.net"},{"key":"31_CR22","volume-title":"Proceedings of DSN","author":"F. Ortmeier","year":"2004","unstructured":"Ortmeier, F., Reif, W.: Safety optimization: A combination of fault tree analysis and optimization techniques. In: Proceedings of DSN, Florence. IEEE Computer Society, Los Alamitos (2004)"},{"key":"31_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1007\/11408901_15","volume-title":"Dependable Computing - EDCC 2005","author":"F. Ortmeier","year":"2005","unstructured":"Ortmeier, F., Reif, W., Schellhorn, G.: Formal safety analysis of a radio-based railroad crossing using deductive cause-consequence analysis (DCCA). In: Dal Cin, M., Ka\u00e2niche, M., Pataricza, A. (eds.) EDCC 2005. LNCS, vol.\u00a03463, pp. 210\u2013224. Springer, Heidelberg (2005)"},{"key":"31_CR24","unstructured":"Ortmeier, F., Schellhorn, G., Reif, W.: Safety optimization of a radio-based railroad crossing. In: Proceedings of FORMS \/ FORMAT (2004)"},{"key":"31_CR25","volume-title":"Formale Sicherheitsanalyse","author":"F. Ortmeier","year":"2006","unstructured":"Ortmeier, F.: Formale Sicherheitsanalyse. Logos Verlag, Berlin (2006)"},{"key":"31_CR26","volume-title":"Proceedings of DCDS","author":"F. Ortmeier","year":"2007","unstructured":"Ortmeier, F., G\u00fcdemann, M., Reif, W.: Formal failure models. In: Proceedings of DCDS. Elsevier, Amsterdam (2007)"},{"key":"31_CR27","doi-asserted-by":"crossref","unstructured":"Ortmeier, F., Schellhorn, G.: Formal Fault Tree Analysis - Practical Experiences. In: Proceedings of AVoCS (2006)","DOI":"10.1016\/j.entcs.2007.05.034"},{"key":"31_CR28","doi-asserted-by":"crossref","unstructured":"Papadopoulos, Y., Walker, M., Parker, D., R\u00fcde, E., Hamann, R., Uhlig, A., Gr\u00e4tz, U., Lie, R.: Engineering failure analysis and design optimisation with hip-hops. Engineering Failure Analysis (2010)","DOI":"10.1016\/j.engfailanal.2010.09.025"},{"key":"31_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-48249-0_13","volume-title":"Computer Safety, Reliability and Security","author":"A. Pasquini","year":"1999","unstructured":"Pasquini, A., Papadopoulos, Y., McDermid, J.: Hierarchically performed hazard origin and propagation studies. In: Felici, M., Kanoun, K., Pasquini, A. (eds.) SAFECOMP 1999. LNCS, vol.\u00a01698, pp. 139\u2013152. Springer, Heidelberg (1999)"},{"key":"31_CR30","doi-asserted-by":"crossref","unstructured":"Deb, K., Pratap, A., Agarwal, S., Meyarivan T.: A fast and elitist multi-objective genetic algorithm: NSGA-II. IEEE Transaction on Evolutionary Computation, 181\u2013197 (2002)","DOI":"10.1109\/4235.996017"},{"key":"31_CR31","unstructured":"Vesley, W., Dugan, J., Fragole, J., Minarik II, J., Railsback, J.: Fault Tree Handbook with Aerospace Applications. NASA Office of Safety and Mission Assurance (August 2002)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24270-0_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T22:50:20Z","timestamp":1560552620000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24270-0_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642242694","9783642242700"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24270-0_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}