{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T08:25:13Z","timestamp":1743150313811,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540182948"},{"type":"electronic","value":"9783642456282"}],"license":[{"start":{"date-parts":[[1987,1,1]],"date-time":"1987-01-01T00:00:00Z","timestamp":536457600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1987,1,1]],"date-time":"1987-01-01T00:00:00Z","timestamp":536457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1987]]},"DOI":"10.1007\/978-3-642-45628-2_2","type":"book-chapter","created":{"date-parts":[[2012,3,5]],"date-time":"2012-03-05T21:25:11Z","timestamp":1330982711000},"page":"13-23","source":"Crossref","is-referenced-by-count":0,"title":["Biased Programming Faults \u2014 How to Overcome Them?"],"prefix":"10.1007","author":[{"given":"Timm","family":"Grams","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"12","key":"2_CR1","first-page":"32","volume":"253","author":"H Lin","year":"1985","unstructured":"H. Lin: The development of software for ballistic-missile defense. Scientific American 253(1985)12, 32\u201339.","journal-title":"Scientific American"},{"unstructured":"R. L. Baber: Software Reflected. North Holland Amsterdam 1982.","key":"2_CR2"},{"issue":"4","key":"2_CR3","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1524\/itit.1986.28.4.196","volume":"28","author":"T Grams","year":"1986","unstructured":"T. Grams: Diversit\u00e4re Programmierung: Kein Allheilmittel. Informationstechnik it 28(1986)4, 196\u2013203.","journal-title":"Informationstechnik it"},{"key":"2_CR4","volume-title":"Visuelles System","author":"WD Keidel","year":"1971","unstructured":"W. D. Keidel: Sinnesphysiologie. Teil 1. Allgemeine Sinnesphysiologie. Visuelles System. Springer Berlin, Heidelberg, New York 1971."},{"key":"2_CR5","volume-title":"Elementare Informationstheorie","author":"H Zemanek","year":"1959","unstructured":"H. Zemanek: Elementare Informationstheorie. R. Oldenbourg Wien, M\u00fcnchen 1959."},{"key":"2_CR6","volume-title":"Band II: Nachrichten\u00fcbertragung","author":"Steinbuch\/","year":"1982","unstructured":"Steinbuch\/ Rupprecht: Nachrichtentechnik. Band II: Nachrichten\u00fcbertragung. Springer Berlin, Heidelberg 1982."},{"key":"2_CR7","volume-title":"Die Biologie des menschlichen Verhaltens","author":"I. Eibl-Eibesfeldt","year":"1984","unstructured":"I. Eibl-Eibesfeldt: Die Biologie des menschlichen Verhaltens. Piper M\u00fcnchen 1984."},{"key":"2_CR8","volume-title":"Versuch einer Naturgeschichte menschlichen Erkennens","author":"K Lorenz","year":"1973","unstructured":"K. Lorenz: Die R\u00fcckseite des Spiegels. Versuch einer Naturgeschichte menschlichen Erkennens. Piper M\u00fcnchen 1973."},{"key":"2_CR9","volume-title":"Evolution\u00e4re Erkenntnistheorie","author":"G Vollmer","year":"1983","unstructured":"G. Vollmer: Evolution\u00e4re Erkenntnistheorie. Hirzel Stuttgart 1983."},{"key":"2_CR10","first-page":"86","volume":"1","author":"B Gillam","year":"1980","unstructured":"B. Gillam: Geometrical illusions. Scientific American (1980)1, 86\u201395.","journal-title":"Scientific American"},{"key":"2_CR11","first-page":"4","volume":"12","author":"LH von Gropengie\u00dfer","year":"1986","unstructured":"Leserbrief von H. Gropengie\u00dfer. Spektr. d. Wiss. (1986)12, 4.","journal-title":"Spektr. d. Wiss."},{"unstructured":"G. M. Weinberg: The Psychology of Computer Programming. New York 1971.","key":"2_CR12"},{"unstructured":"D. D\u00f6rner: Probleml\u00f6sen als Informationsverarbeitung. Kohlhammer Stuttgart 1976.","key":"2_CR13"},{"key":"2_CR14","volume-title":"Objective Knowledge","author":"KR Popper","year":"1972","unstructured":"K. R. Popper: Objective Knowledge. Clarendon Press Oxford 1972."},{"key":"2_CR15","volume-title":"Die stammesgeschichtlichen Grundlagen der Vernunft","author":"R Riedl","year":"1981","unstructured":"R. Riedl: Biologie der Erkenntnis. Die stammesgeschichtlichen Grundlagen der Vernunft. Paul Parey Berlin, Hamburg 1981."},{"volume-title":"Encyclopedia of Psychology (4 vol.)","year":"1984","unstructured":"R. J. Corsini (edt.): Encyclopedia of Psychology (4 vol.). John Wiley New York 1984.","key":"2_CR16"},{"key":"2_CR17","volume-title":"The Hidden Persuaders","author":"V Packard","year":"1982","unstructured":"V. Packard: The Hidden Persuaders. Van Rees New York 1982."},{"unstructured":"S. Freud: Zur Psychopathologie des Alltagslebens. Fischer 1977.","key":"2_CR18"},{"unstructured":"N. Wirth: Data structures and algorithms. Scientific American (1984)9, 48-57.","key":"2_CR19"},{"doi-asserted-by":"crossref","unstructured":"H. D. Mills: Structured Programming: Retrospect and Prospect. IEEE Software (Nov. 1986), 58-66.","key":"2_CR20","DOI":"10.1109\/MS.1986.229478"},{"unstructured":"B. W. Kernighan, P. J. Plauger: The Elements of Programming Style. Mc Graw-Hill 1978.","key":"2_CR21"},{"unstructured":"G. J. Myers: The Art of Software Testing. Whiley 1979.","key":"2_CR22"},{"issue":"2","key":"2_CR23","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1147\/sj.242.0150","volume":"24","author":"CL Jones","year":"1985","unstructured":"C. L. Jones: A process-integrated approach to defect prevention. IBM Systems Journal 24(1985)2, 150\u2013167.","journal-title":"IBM Systems Journal"},{"issue":"12","key":"2_CR24","doi-asserted-by":"publisher","first-page":"1511","DOI":"10.1109\/TSE.1985.231895","volume":"SE-11","author":"DA Eckhardt","year":"1985","unstructured":"D. A. Eckhardt, L. D. Lee: A Theoretical Basis for the Analysis of Multiversion Software Subject to Coincident Errors. IEEE Trans. on Software Engineering SE-11 (Dec. 1985)12, 1511\u20131517.","journal-title":"IEEE Trans. on Software Engineering"},{"doi-asserted-by":"crossref","unstructured":"J. C. Knight, N. G. Leveson: Correlated failures in multiversion software. IFAC-SAFECOMP\u2019 85, Como, Italy, 159-165.","key":"2_CR25","DOI":"10.1016\/S1474-6670(17)60100-9"}],"container-title":["Informatik-Fachberichte","Fehlertolerierende Rechensysteme \/ Fault-Tolerant Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-45628-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,16]],"date-time":"2023-02-16T20:07:59Z","timestamp":1676578079000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-45628-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1987]]},"ISBN":["9783540182948","9783642456282"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-45628-2_2","relation":{},"ISSN":["0343-3005"],"issn-type":[{"type":"print","value":"0343-3005"}],"subject":[],"published":{"date-parts":[[1987]]}}}