{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:58:52Z","timestamp":1725746332939},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642407925"},{"type":"electronic","value":"9783642407932"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40793-2_18","type":"book-chapter","created":{"date-parts":[[2013,8,27]],"date-time":"2013-08-27T02:10:59Z","timestamp":1377569459000},"page":"190-201","source":"Crossref","is-referenced-by-count":1,"title":["Safety Transformations: Sound and Complete?"],"prefix":"10.1007","author":[{"given":"Ute","family":"Schiffel","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/s10270-004-0058-x","volume":"4","author":"W. Ahrendt","year":"2005","unstructured":"Ahrendt, W., Baar, T., Beckert, B., Bubel, R., Giese, M., H\u00e4hnle, R., Menzel, W., Mostowski, W., Roth, A., Schlager, S., Schmitt, P.H.: The KeY Tool. Software and System Modeling\u00a04, 32\u201354 (2005)","journal-title":"Software and System Modeling"},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-540-74792-5_4","volume-title":"Formal Methods for Components and Objects","author":"W. Ahrendt","year":"2007","unstructured":"Ahrendt, W., Beckert, B., H\u00e4hnle, R., R\u00fcmmer, P., Schmitt, P.H.: Verifying Object-Oriented Programs with KeY: A\u00a0Tutorial. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2006. LNCS, vol.\u00a04709, pp. 70\u2013101. Springer, Heidelberg (2007)"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Avizienis, A.: Arithmetic Error Codes: Cost and Effectiveness Studies for Application in Digital System Design. In: IEEE Transactions on Computers, pp. 1322\u20131331 (1971)","DOI":"10.1109\/T-C.1971.223134"},{"key":"18_CR4","first-page":"211","volume-title":"Proceedings of the 30th International Conference on Software Engineering, ICSE 2008","author":"D. Babic","year":"2008","unstructured":"Babic, D., Hu, A.J.: Calysto: scalable and precise extended static checking. In: Proceedings of the 30th International Conference on Software Engineering, ICSE 2008, pp. 211\u2013220. ACM, New York (2008)"},{"issue":"6","key":"18_CR5","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MM.2005.110","volume":"25","author":"S. Borkar","year":"2005","unstructured":"Borkar, S.: Designing Reliable Systems from Unreliable Components: The Challenges of Transistor Variability and Degradation. IEEE Micro.\u00a025(6), 10\u201316 (2005)","journal-title":"IEEE Micro."},{"key":"18_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/978-3-642-00768-2_16","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"R. Brummayer","year":"2009","unstructured":"Brummayer, R., Biere, A.: Boolector: An Efficient SMT Solver for Bit-Vectors and Arrays. In: Kowalewski, S., Philippou, A. (eds.) TACAS 2009. LNCS, vol.\u00a05505, pp. 174\u2013177. Springer, Heidelberg (2009)"},{"key":"18_CR7","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/DSN.2006.15","volume-title":"Proceedings of the International Conference on Dependable Systems and Networks (DSN)","author":"J. Chang","year":"2006","unstructured":"Chang, J., Reis, G.A., August, D.I.: Automatic Instruction-Level Software-Only Recovery. In: Proceedings of the International Conference on Dependable Systems and Networks (DSN), pp. 83\u201392. IEEE Computer Society, Washington, DC (2006)"},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/978-3-540-24730-2_15","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"E.M. Clarke","year":"2004","unstructured":"Clarke, E.M., Kroning, D., Lerda, F.: A Tool for Checking ANSI-C Programs. In: Jensen, K., Podelski, A. (eds.) TACAS 2004. LNCS, vol.\u00a02988, pp. 168\u2013176. Springer, Heidelberg (2004)"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-540-78800-3_24","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"L. Moura de","year":"2008","unstructured":"de Moura, L., Bj\u00f8rner, N.S.: Z3: An Efficient SMT Solver. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol.\u00a04963, pp. 337\u2013340. Springer, Heidelberg (2008)"},{"key":"18_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3233\/SAT190086","volume":"8","author":"A. Griggio","year":"2012","unstructured":"Griggio, A.: A Practical Approach to Satisfiability Modulo Linear Integer Arithmetic. Journal on Satisfiability, Boolean Modeling and Computation (JSAT)\u00a08, 1\u201327 (2012)","journal-title":"Journal on Satisfiability, Boolean Modeling and Computation (JSAT)"},{"key":"18_CR11","unstructured":"Larsson, D., H\u00e4hnle, R.: Symbolic Fault Injection. In: 4th International Verification Workshop in connection with CADE-21, Bremen, Germany, pp. 85\u2013103 (2007)"},{"key":"18_CR12","first-page":"75","volume-title":"Proceedings of the International Symposium on Code Generation and Optimization (CGO)","author":"C. Lattner","year":"2004","unstructured":"Lattner, C., Adve, V.: LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation. In: Proceedings of the International Symposium on Code Generation and Optimization (CGO), p. 75. IEEE Computer Society, Washington, DC (2004)"},{"key":"18_CR13","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1538788.1538814","volume":"52","author":"X. Leroy","year":"2009","unstructured":"Leroy, X.: Formal verification of a realistic compiler. Commun. ACM\u00a052, 107\u2013115 (2009)","journal-title":"Commun. ACM"},{"key":"18_CR14","unstructured":"The MathWorks. Code Verification and Run-Time Error Detection Through Abstract Interpretation. Technical report, The MathWorks (2012)"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-642-27705-4_12","volume-title":"Verified Software: Theories, Tools, Experiments","author":"F. Merz","year":"2012","unstructured":"Merz, F., Falke, S., Sinz, C.: LLBMC: bounded model checking of C and C++ programs using a compiler IR. In: Joshi, R., M\u00fcller, P., Podelski, A. (eds.) VSTTE 2012. LNCS, vol.\u00a07152, pp. 146\u2013161. Springer, Heidelberg (2012)"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Pattabiraman, K., Nakka, N., Kalbarczyk, Z., Iyer, R.: SymPLFIED: Symbolic program-level fault injection and error detection framework. In: IEEE International Conference on Dependable Systems and Networks With FTCS and DCC, DSN 2008, pp. 472\u2013481 (June 2008)","DOI":"10.1109\/DSN.2008.4630118"},{"key":"18_CR17","unstructured":"Reis, G.A., Chang, J., August, D.I., Cohn, R., Mukherjee, S.S.: Configurable Transient Fault Detection via Dynamic Binary Translation. In: Proceedings of the 2nd Workshop on Architectural Reliability (2006)"},{"key":"18_CR18","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1109\/CGO.2005.34","volume-title":"Proceedings of the International Symposium on Code Generation and Optimization (CGO)","author":"G.A. Reis","year":"2005","unstructured":"Reis, G.A., Chang, J., Vachharajani, N., Rangan, R., August, D.I.: SWIFT: Software Implemented Fault Tolerance. In: Proceedings of the International Symposium on Code Generation and Optimization (CGO), pp. 243\u2013254. IEEE Computer Society, Washington, DC (2005)"},{"key":"18_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-642-15651-9_13","volume-title":"Computer Safety, Reliability, and Security","author":"U. Schiffel","year":"2010","unstructured":"Schiffel, U., Schmitt, A., S\u00fc\u00dfkraut, M., Fetzer, C.: ANB- and aNBDmem-encoding: Detecting hardware errors in software. In: Schoitsch, E. (ed.) SAFECOMP 2010. LNCS, vol.\u00a06351, pp. 169\u2013182. Springer, Heidelberg (2010)"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Schiffel, U., Schmitt, A., S\u00fc\u00dfkraut, M., Fetzer, C.: Software-Implemented Hardware Error Detection: Costs and Gains. In: The Third International Conference on Dependability, DEPEND 2010 (2010)","DOI":"10.1109\/DEPEND.2010.16"},{"key":"18_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-642-04468-7_23","volume-title":"Computer Safety, Reliability, and Security","author":"C. Fetzer","year":"2009","unstructured":"Fetzer, C., Schiffel, U., S\u00fc\u00dfkraut, M.: AN-encoding compiler: Building safety-critical systems with commodity hardware. In: Buth, B., Rabe, G., Seyfarth, T. (eds.) SAFECOMP 2009. LNCS, vol.\u00a05775, pp. 283\u2013296. Springer, Heidelberg (2009)"},{"key":"18_CR22","unstructured":"Seelemann, M.: Evaluation of Predicate-Complete Test Coverage and Symbolic Execution for Software Testing and Verification. Master\u2019s thesis, Technische Universit\u00e4t Dresden (2010)"},{"key":"18_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-642-25271-6_15","volume-title":"Formal Methods for Components and Objects","author":"R. Svenningsson","year":"2011","unstructured":"Svenningsson, R., Eriksson, H., Vinter, J., T\u00f6rngren, M.: Generic fault modelling for fault injection. In: Aichernig, B.K., de Boer, F.S., Bonsangue, M.M. (eds.) FMCO 2010. LNCS, vol.\u00a06957, pp. 287\u2013296. Springer, Heidelberg (2011)"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Wappler, U., Fetzer, C.: Hardware Failure Virtualization Via Software Encoded Processing. In: 5th IEEE International Conference on Industrial Informatics, INDIN 2007 (2007)","DOI":"10.1109\/INDIN.2007.4384907"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40793-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,2]],"date-time":"2020-08-02T16:17:49Z","timestamp":1596385069000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40793-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642407925","9783642407932"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40793-2_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}