{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T09:13:18Z","timestamp":1725613998828},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642331756"},{"type":"electronic","value":"9783642331763"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33176-3_5","type":"book-chapter","created":{"date-parts":[[2012,9,12]],"date-time":"2012-09-12T04:53:23Z","timestamp":1347425603000},"page":"63-75","source":"Crossref","is-referenced-by-count":6,"title":["Safety Lifecycle Development Process Modeling for Embedded Systems - Example of Railway Domain"],"prefix":"10.1007","author":[{"given":"Brahim","family":"Hamid","sequence":"first","affiliation":[]},{"given":"Jacob","family":"Geisel","sequence":"additional","affiliation":[]},{"given":"Adel","family":"Ziani","sequence":"additional","affiliation":[]},{"given":"David","family":"Gonzalez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","first-page":"48","volume-title":"Managing process compliance","author":"L.Y.C. Cheung","year":"2003","unstructured":"Cheung, L.Y.C., Chung, P.W.H., Dawson, R.J.: Managing process compliance, pp. 48\u201362. IGI Publishing, Hershey (2003), http:\/\/portal.acm.org\/citation.cfm?id=954321.954326"},{"key":"5_CR2","unstructured":"EPF: http:\/\/www.eclipse.org\/epf"},{"key":"5_CR3","unstructured":"Exida: Iec 61508 overview report (version 2.0 ). Tech. rep. (January 2006)"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Gray, J., Tolvanen, J.P., Kelly, S., Gokhale, A., Neema, S., Sprinkle, J.: Domain-Specific Modeling. Chapman & Hall\/CRC (2007)","DOI":"10.1201\/9781420010855.pt2"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Hamid, B., Desnos, N., Grepet, C., Jouvray, C.: Model-based security and dependability patterns in RCES: the TERESA approach. In: 1st International Workshop on Security and Dependability for Resource Constrained Embedded Systems, SD4RCES (2010)","DOI":"10.1145\/1868433.1868444"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/978-3-642-24485-8_23","volume-title":"Model Driven Engineering Languages and Systems","author":"B. Hamid","year":"2011","unstructured":"Hamid, B., G\u00fcrgens, S., Jouvray, C., Desnos, N.: Enforcing S&D Pattern Design in RCES with Modeling and Formal Approaches. In: Whittle, J., Clark, T., K\u00fchne, T. (eds.) MODELS 2011. LNCS, vol.\u00a06981, pp. 319\u2013333. Springer, Heidelberg (2011)"},{"issue":"1","key":"5_CR7","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.infsof.2004.06.001","volume":"47","author":"B. Henderson-Sellers","year":"2005","unstructured":"Henderson-Sellers, B., Gonzalez-Perez, C.: A comparison of four process metamodels and the creation of a new generic standard. Information & Software Technology\u00a047(1), 49\u201365 (2005)","journal-title":"Information & Software Technology"},{"key":"5_CR8","doi-asserted-by":"publisher","first-page":"3727","DOI":"10.1098\/rsta.2008.0141","volume":"366","author":"T. Henzinger","year":"2008","unstructured":"Henzinger, T.: Two challenges in embedded systems design: Predictability and robustness. Philosophical Transactions of the Royal Society A\u00a0366, 3727\u20133736 (2008)","journal-title":"Philosophical Transactions of the Royal Society A"},{"key":"5_CR9","doi-asserted-by":"publisher","first-page":"1730","DOI":"10.1016\/j.jss.2009.05.020","volume":"82","author":"C. Hug","year":"2009","unstructured":"Hug, C., Front, A., Rieu, D., Henderson-Sellers, B.: A method to build information systems engineering process metamodels. J. Syst. Softw.\u00a082, 1730\u20131742 (2009)","journal-title":"J. Syst. Softw."},{"key":"5_CR10","unstructured":"IEC\u00a061508, I.S.: Functional safety of electrical\/ electronic\/programmable electronic safetyrelated systems (2000)"},{"key":"5_CR11","unstructured":"IEC\u00a061511, I.S.: Functional safety - safety instrumented systems for the process industry sector (2003)"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Kopetz, H.: The complexity challenge in embedded system design. In: ISORC, pp. 3\u201312 (2008)","DOI":"10.1109\/ISORC.2008.14"},{"key":"5_CR13","unstructured":"OMG: Software & Systems Process Engineering Meta-Model Specification (2008)"},{"key":"5_CR14","unstructured":"(OPF), O.P.F. http:\/\/www.opfro.org\/"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0054216","volume-title":"Advanced Information Systems Engineering","author":"C. Rolland","year":"1998","unstructured":"Rolland, C.: A Comprehensive View of Process Engineering. In: Pernici, B., Thanos, C. (eds.) CAiSE 1998. LNCS, vol.\u00a01413, pp. 1\u201324. Springer, Heidelberg (1998)"},{"key":"5_CR16","unstructured":"S84.01, A.S.: Application of safety instrumented systems for the process industry (1996)"},{"key":"5_CR17","doi-asserted-by":"crossref","DOI":"10.4324\/9780080477923","volume-title":"Functional Safety: A straightforward guide to applying IEC 61508 and related standards","author":"D.J. Smith","year":"2004","unstructured":"Smith, D.J., Simpson, K.G.L.: Functional Safety: A straightforward guide to applying IEC 61508 and related standards, 2nd edn. Elsevier, Butterworth Heinemann (2004)","edition":"2"},{"key":"5_CR18","unstructured":"Standards Australia: Standard Metamodel for Software Development Methodologies (2004)"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Ziani, A., Hamid, B., Trujillo, S.: Towards a unified meta-model for resources-constrained embedded systems. In: 37th EUROMICRO Conference on Software Engineering and Advanced Applications, pp. 485\u2013492. IEEE (2011)","DOI":"10.1109\/SEAA.2011.79"}],"container-title":["Lecture Notes in Computer Science","Software Engineering for Resilient Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33176-3_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,28]],"date-time":"2022-01-28T14:26:38Z","timestamp":1643379998000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33176-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642331756","9783642331763"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33176-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}