{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:01:59Z","timestamp":1725897719044},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642336775"},{"type":"electronic","value":"9783642336782"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33678-2_33","type":"book-chapter","created":{"date-parts":[[2012,9,6]],"date-time":"2012-09-06T11:02:42Z","timestamp":1346929362000},"page":"388-399","source":"Crossref","is-referenced-by-count":4,"title":["Efficient Software Component Reuse in Safety-Critical Systems \u2013 An Empirical Study"],"prefix":"10.1007","author":[{"given":"Rikard","family":"Land","sequence":"first","affiliation":[]},{"given":"Mikael","family":"\u00c5kerholm","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Carlson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","unstructured":"\u00c5kerholm, M., Land, R.: Towards Systematic Software Reuse in Certifiable Safety-Critical Systems. In: RESAFE - International Workshop on Software Reuse and Safety, Falls Church, VA (2009)"},{"key":"33_CR2","doi-asserted-by":"crossref","unstructured":"Hissam, S.A., Moreno, A.G., Stafford, J., Wallnau, K.C.: Enabling Predictable Assembly. Journal of Systems & Software\u00a065(3) (2003)","DOI":"10.1016\/S0164-1212(02)00038-9"},{"key":"33_CR3","unstructured":"Larsson, M.: Predicting Quality Attributes in Component-based Software Systems. Ph.D. Thesis. M\u00e4lardalen University (2004)"},{"key":"33_CR4","unstructured":"Voas, J.: Why Is It So Hard to Predict Software System Trustworthiness from Software Component Trustworthiness? In: 20th IEEE Symposium on Reliable Distributed Systems, SRDS 2001 (2001)"},{"key":"33_CR5","unstructured":"Lougee, H.: Reuse and DO-178B Certified Software: Beginning With Reuse Basics. Crosstalk \u2013 the Journal of Defense Software Engineering (December 2004)"},{"key":"33_CR6","unstructured":"Khanna, V., DeWalt, M.: Reusable Sw components (RSC) in real life. In: Software\/CEH Conference, Norfolk, VA (2005)"},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"Wlad, J.: Software Reuse in Safety-Critical Airborne Systems. In: 25th Digital Avionics Systems Conference (2006)","DOI":"10.1109\/DASC.2006.313740"},{"key":"33_CR8","unstructured":"Karlsson, E.-A., Software Reuse : A Holistic Approach. John Wiley & Sons Ltd. (1995) ISBN 0 471 95819 0"},{"key":"33_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-540-68073-4_9","volume-title":"High Confidence Software Reuse in Large Systems","author":"R. Land","year":"2008","unstructured":"Land, R., Blankers, L., Chaudron, M., Crnkovi\u0107, I.: COTS Selection Best Practices in Literature and in Industry. In: Mei, H. (ed.) ICSR 2008. LNCS, vol.\u00a05030, pp. 100\u2013111. Springer, Heidelberg (2008)"},{"key":"33_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-642-04211-9_15","volume-title":"Formal Foundations of Reuse and Domain Engineering","author":"R. Land","year":"2009","unstructured":"Land, R., Sundmark, D., L\u00fcders, F., Krasteva, I., Causevic, A.: Reuse with Software Components - A Survey of Industrial State of Practice. In: Edwards, S.H., Kulczycki, G. (eds.) ICSR 2009. LNCS, vol.\u00a05791, pp. 150\u2013159. Springer, Heidelberg (2009)"},{"key":"33_CR11","unstructured":"Lu, D., Lutz, R.R.: Fault Contribution Trees for Product Families. In: 13th International Symposium on Software Reliability Engineering, ISSRE 2002 (2002)"},{"key":"33_CR12","unstructured":"Liu, J., Dehlinger, J., Lutz, R.: Safety Analysis of Software Product Lines Using State-Based Modeling. In: 16th IEEE International Symposium on Software Reliability Engineering, ISSRE 2005 (2005)"},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"Conmy, P., Bate, I.: Component-Based Safety Analysis of FPGAs. IEEE Transactions on Industrial Informatics\u00a06(2) (2010)","DOI":"10.1109\/TII.2009.2039938"},{"key":"33_CR14","doi-asserted-by":"crossref","unstructured":"Despotou, G., Kelly, T.: Investigating The Use of Argument Modularity To Optimise Through-Life System Safety Assurance. In: 3rd IET International Conference on System Safety (ICSS), Birmingham (2008)","DOI":"10.1049\/cp:20080746"},{"key":"33_CR15","unstructured":"Bate, I., Hawkins, R., McDermid, J.: A Contract-based Approach to Designing Safe Systems. In: 8th Australian Workshop on Safety Critical Systems and Software, SCS 2003 (2003)"},{"key":"33_CR16","unstructured":"As-2 Embedded Computing Systems Committee, \"Architecture Analysis & Design Language (AADL),\" Standard Document Number AS5506 (2009)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33678-2_33.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T08:18:49Z","timestamp":1620116329000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33678-2_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642336775","9783642336782"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33678-2_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}