{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T07:59:55Z","timestamp":1743148795017,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540182948"},{"type":"electronic","value":"9783642456282"}],"license":[{"start":{"date-parts":[[1987,1,1]],"date-time":"1987-01-01T00:00:00Z","timestamp":536457600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1987,1,1]],"date-time":"1987-01-01T00:00:00Z","timestamp":536457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1987]]},"DOI":"10.1007\/978-3-642-45628-2_1","type":"book-chapter","created":{"date-parts":[[2012,3,5]],"date-time":"2012-03-05T21:25:11Z","timestamp":1330982711000},"page":"1-12","source":"Crossref","is-referenced-by-count":1,"title":["Software Fault Tolerance in Safety-Critical Applications"],"prefix":"10.1007","author":[{"given":"Nancy G.","family":"Leveson","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Anderson, T., Barrett, P.A., Halliwell, D.N., and Moulding, M.R. \u201cAn evaluation of software fault tolerance in a practical system,\u201d 15th Int. Symposium on Fault Tolerant Computing (FTCS-15), June 1985, pp. 140-145."},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Andrews, D.M. and Benson, J.T. \u201cAn automated program testing methodology and its implementation,\u201d Proc. 5th Int. Conference on Software Engineering, San Diego, CA, March 1981.","DOI":"10.21236\/ADA094485"},{"key":"1_CR3","unstructured":"Brilliant, S.S, Knight, J.C., and Leveson, N.G. \u201cAnalysis of faults in an n-version software experiment,\u201d submitted for publication, 1986."},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Brilliant, S.S., Knight, J.C., and Leveson, N.G. \u201cThe consistent comparison problem in n-version software,\u201d ACM SIGSOFT Software Engineering Notes, vol. 12, no. 1, January 1987).","DOI":"10.1145\/24574.24575"},{"key":"1_CR5","unstructured":"Cha, S., Leveson, N.G., Shimeall, T.J., and Knight, J.C. \u201cAn empirical study of software error detection using self-checks,\u201d 17th Int. Symposium on Fault Tolerant Computing, Pittburgh, July 1987."},{"key":"1_CR6","unstructured":"Chen, L. and Avizienis, A. \u201cN-version programming: A fault-tolerance approach to reliability of software operation,\u201d 8th Int. Symposium on Fault Tolerant Computing, Toulouse, France, June 1978, pp. 3-9."},{"issue":"10","key":"1_CR7","first-page":"88","volume":"33","author":"E Joyce","year":"1987","unstructured":"Joyce, E. \u201cSoftware bugs: A matter of life and liability,\u201d Datamation, vol. 33, no. 10, 15 May 1987, pp. 88\u201392.","journal-title":"Datamation"},{"issue":"2","key":"1_CR8","first-page":"73","volume":"2","author":"E Kit","year":"1986","unstructured":"Kit, E. \u201cState-of-the-art C Compiler Testing,\u201d Tandem Systems Review, vol. 2, no. 2, June 1986, pp. 73\u201378.","journal-title":"Tandem Systems Review"},{"issue":"1","key":"1_CR9","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/TSE.1986.6312924","volume":"12","author":"JC Knight","year":"1986","unstructured":"Knight, J.C. and Leveson, N.G. \u201cAn experimental evaluation of the assumption of independence in multiversion programming,\u201d IEEE Trans. on Software Engineering, vol. SE-12, no. 1, January 1986, pp. 96\u2013109.","journal-title":"IEEE Trans. on Software Engineering"},{"key":"1_CR10","unstructured":"Knight, J.C. and Leveson, N.G. \u201cAn empirical study of failure probabilities in multiversion software,\u201d Proc. 16th Int. Symposium on Fault Tolerant Computing (FTCS-16), Vienna, Austria, July 1986, pp. 165-170."},{"issue":"2","key":"1_CR11","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1145\/7474.7528","volume":"18","author":"NG Leveson","year":"1986","unstructured":"Leveson, N.G. \u201cSoftware safety: Why, what, and how,\u201d ACM Computing Surveys, vol. 18, no. 2, June 1986, pp. 125\u2013163.","journal-title":"ACM Computing Surveys"},{"issue":"5","key":"1_CR12","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1109\/TSE.1983.235116","volume":"SE-9","author":"NG Leveson","year":"1983","unstructured":"Leveson, N.G. and Harvey, P.R. \u201cAnalyzing software safety,\u201d IEEE Trans. on Software Engineering, vol. SE-9, no. 5, September 1983, pp. 569\u2013579.","journal-title":"IEEE Trans. on Software Engineering"},{"issue":"3","key":"1_CR13","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1109\/TSE.1987.233170","volume":"SE-13","author":"NG Leveson","year":"1987","unstructured":"Leveson, N.G. and Stolzy, J.L. \u201cSafety analysis using petri nets,\u201d IEEE Trans. on Software Engineering, vol. SE-13, no. 3, March 1987, pp. 386\u2013397.","journal-title":"IEEE Trans. on Software Engineering"},{"key":"1_CR14","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1109\/TSE.1975.6312842","volume":"SE-1","author":"B Randell","year":"1975","unstructured":"Randell, B. \u201cSystem structure for software fault tolerance,\u201d IEEE Trans. on Software Engineering, vol. SE-1, pp. 220\u2013232, June 1975.","journal-title":"IEEE Trans. on Software Engineering"},{"issue":"5","key":"1_CR15","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1109\/TSE.1987.233463","volume":"SE-13","author":"RK Scott","year":"1987","unstructured":"Scott, R.K., Gault, J.W., McAllister, D.F. \u201cFault-tolerant software reliability modeling,\u201d IEEE Trans. on Software Engineering, vol. SE-13, no.5, May 1987, pp. 582\u2013592.","journal-title":"IEEE Trans. on Software Engineering"},{"key":"1_CR16","unstructured":"Stucki, L.G. \u201cNew directions in automated tools for improving software quality,\u201d Current Trends in Programming Methodology (Volume II: Program Validation), Prentice-Hall, 1977."},{"issue":"8","key":"1_CR17","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1145\/358198.358210","volume":"27","author":"K Thompson","year":"1984","unstructured":"Thompson, K. \u201cReflections on trusting trust,\u201d Communications of the ACM, vol. 27, no. 8, August 1984, pp. 761\u2013763.","journal-title":"Communications of the ACM"},{"key":"1_CR18","unstructured":"Vesely, W.E., Goldberg, F.F., Roberts, N.H., and Haasl, D.F. Fault Tree Handbook, NUREG-0492, U.S. Nuclear Regulatory Commission, January 1981."},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Yount, L.J., Lievel, K.A., and Hill. B.H. \u201cFault effect protection and partitioning for fly-by-wire\/fly-by-light avionics systems,\u201d AIAA Computers in Aerospace V Conference, Long Beach, CA, October 1985, pp.275-284.","DOI":"10.2514\/6.1985-6002"}],"container-title":["Informatik-Fachberichte","Fehlertolerierende Rechensysteme \/ Fault-Tolerant Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-45628-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,21]],"date-time":"2024-04-21T02:04:34Z","timestamp":1713665074000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-45628-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1987]]},"ISBN":["9783540182948","9783642456282"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-45628-2_1","relation":{},"ISSN":["0343-3005"],"issn-type":[{"type":"print","value":"0343-3005"}],"subject":[],"published":{"date-parts":[[1987]]}}}