{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:16:28Z","timestamp":1740096988851,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642539558"},{"type":"electronic","value":"9783642539565"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-53956-5_15","type":"book-chapter","created":{"date-parts":[[2014,1,8]],"date-time":"2014-01-08T21:14:35Z","timestamp":1389215675000},"page":"217-235","source":"Crossref","is-referenced-by-count":4,"title":["Towards Formal Safety Analysis in Feature-Oriented Product Line Development"],"prefix":"10.1007","author":[{"given":"Sara","family":"Bessling","sequence":"first","affiliation":[]},{"given":"Michaela","family":"Huhn","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/11925040_8","volume-title":"Leveraging Applications of Formal Methods","author":"P.A. Abdulla","year":"2006","unstructured":"Abdulla, P.A., Deneux, J., St\u00e5lmarck, G., \u00c5gren, H., \u00c5kerlund, O.: Designing safe, reliable systems using scade. In: Margaria, T., Steffen, B. (eds.) ISoLA 2004. LNCS, vol.\u00a04313, pp. 115\u2013129. Springer, Heidelberg (2006)"},{"issue":"5","key":"15_CR2","doi-asserted-by":"publisher","first-page":"49","DOI":"10.5381\/jot.2009.8.5.c5","volume":"8","author":"S. Apel","year":"2009","unstructured":"Apel, S., K\u00e4stner, C.: An overview of feature-oriented software development. Journal of Object Technology\u00a08(5), 49\u201384 (2009)","journal-title":"Journal of Object Technology"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-642-13688-7_2","volume-title":"Theory and Practice of Model Transformations","author":"M. Azanza","year":"2010","unstructured":"Azanza, M., Batory, D., D\u00edaz, O., Trujillo, S.: Domain-specific composition of model deltas. In: Tratt, L., Gogolla, M. (eds.) ICMT 2010. LNCS, vol.\u00a06142, pp. 16\u201330. Springer, Heidelberg (2010)"},{"key":"15_CR4","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1046\/j.1460-9592.2002.00260.x","volume":"25","author":"Bernstein","year":"2002","unstructured":"Bernstein, Daubert, Fletcher, Hayes, L\u00fcderitz, Reynolds, Schoenfeld, Sutton: The revised NASPE\/BPEG generic code for antibradycardia, adaptive-rate, and multisite pacing. Journal of Pacing and Clinical Electrophysiology\u00a025, 260\u2013264 (2002)","journal-title":"Journal of Pacing and Clinical Electrophysiology"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Classen, A., Heymans, P., Schobbens, P.-Y., Legay, A.: Symbolic model checking of software product lines. In: Intern. Conf. on Software Engineering (ICSE), pp. 321\u2013330 (2011)","DOI":"10.1145\/1985793.1985838"},{"key":"15_CR6","unstructured":"Esterel Technologies: SCADE Suite KCG 6.1: Safety case report of KCG 6.1.2 (July 2009)"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Feiler, P., Rugina, A.: Dependability modeling with the architecture analysis & design language (AADL). Tech. rep., Software Engineering Institute, CMU (July 2007)","DOI":"10.21236\/ADA455842"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Fischbein, D., Uchitel, S., Brabermann, V.: A foundation for behavioural conformance in software product line architectures. In: ISSTA 2006 Workshop on Role of Software Architecture for Testing and Analysis (ROSATEA), pp. 39\u201348. ACM (2006)","DOI":"10.1145\/1147249.1147254"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Ortmeier, F., Matthias G\u00fcdemann, W.R.: Formal failure models. In: 1st IFAC Workshop on Dependable Control of Discrete Systems, vol.\u00a01, pp. 145\u2013150 (2007)","DOI":"10.3182\/20070613-3-FR-4909.00027"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Gray, J.G., Zhang, J., Lin, Y., Roychoudhury, S., Wu, H., Sudarsan, R., Gokhale, A.S., Neema, S., Shi, F., Bapty, T.: Model driven program transformation. In: Intern. Conf. on Generative Programming and Component Engineering (GPCE), pp. 361\u2013378 (2004)","DOI":"10.1007\/978-3-540-30175-2_19"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Haugen, M\u00f8ller-Pedersen, Oldevik, Olsen, Svendsen: Adding standardized variability to domain specific languages. In: Intern. Software Product Line Conference, pp. 139\u2013148. IEEE Computer Society (2008)","DOI":"10.1109\/SPLC.2008.25"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-642-39088-3_3","volume-title":"Foundations of Health Information Engineering and Systems","author":"M. Huhn","year":"2013","unstructured":"Huhn, M., Bessling, S.: Enhancing product line development by safety requirements and verification. In: Weber, J., Perseil, I. (eds.) FHIES 2012. LNCS, vol.\u00a07789, pp. 37\u201354. Springer, Heidelberg (2013)"},{"key":"15_CR13","unstructured":"IEC: 60812: Analysis techniques for system reliability"},{"key":"15_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-642-16561-0_33","volume-title":"Leveraging Applications of Formal Methods, Verification, and Validation","author":"E. Jee","year":"2010","unstructured":"Jee, E., Lee, I., Sokolsky, O.: Assurance cases in model-driven development of the pacemaker software. In: Margaria, T., Steffen, B. (eds.) ISoLA 2010, Part II. LNCS, vol.\u00a06416, pp. 343\u2013356. Springer, Heidelberg (2010)"},{"key":"15_CR15","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/RTCSA.2010.42","volume-title":"Proceedings of the 2010 IEEE 16th International Conference on Embedded and Real-Time Computing Systems and Applications","author":"Jee","year":"2010","unstructured":"Jee, Wang, Kim, Lee, Sokolsky, Lee: A safety-assured development approach for real-time software. In: Proceedings of the 2010 IEEE 16th International Conference on Embedded and Real-Time Computing Systems and Applications, pp. 133\u2013142. IEEE Computer Society, Washington, DC (2010), \n                    \n                      http:\/\/dx.doi.org\/10.1109\/RTCSA.2010.42"},{"key":"15_CR16","unstructured":"Larson, B.R.: Integrated clinical environment patient-controlled analgesia infusion pump (January 2012)"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Leveson, N.G.: Engineering a Safer World: Systems Thinking Applied to Safety (Engineering Systems). The MIT Press (January 2012), \n                    \n                      http:\/\/www.worldcat.org\/isbn\/0262016621","DOI":"10.7551\/mitpress\/8179.001.0001"},{"issue":"1","key":"15_CR18","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s10515-010-0075-7","volume":"18","author":"J. Liu","year":"2011","unstructured":"Liu, J., Basu, S., Lutz, R.R.: Compositional model checking of software product lines using variation point obligations. Autom. Softw. Eng.\u00a018(1), 39\u201376 (2011)","journal-title":"Autom. Softw. Eng."},{"key":"15_CR19","doi-asserted-by":"publisher","first-page":"1879","DOI":"10.1016\/j.jss.2007.01.047","volume":"80","author":"J. Liu","year":"2007","unstructured":"Liu, J., Dehlinger, J., Lutz, R.R.: Safety analysis of software product lines using state-based modeling. The Journal of Systems and Software\u00a080, 1879\u20131892 (2007)","journal-title":"The Journal of Systems and Software"},{"key":"15_CR20","unstructured":"OptXware Research and Development LLC: The Viatra-I model transformation framework pattern language specification"},{"key":"15_CR21","unstructured":"OptXware Research and Development LLC: The Viatra-I model transformation framework users\u2019 guide"},{"key":"15_CR22","unstructured":"Pahl, G., Beitz, W., Feldhusen, J., Grote, K.H.: Pahl\/Beitz Konstruktionslehre: Grundlagen erfolgreicher Produktentwicklung, 7. aufl. edn. Methoden und Anwendung. Springer, Berlin (2006), \n                    \n                      http:\/\/link.springer.com\/book\/10.1007\/978-3-540-34061-4\/page\/1"},{"key":"15_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-642-25271-6_10","volume-title":"Formal Methods for Components and Objects","author":"I. Schaefer","year":"2011","unstructured":"Schaefer, I., Gurov, D., Soleimanifard, S.: Compositional algorithmic verification of software product lines. In: Aichernig, B.K., de Boer, F.S., Bonsangue, M.M. (eds.) Formal Methods for Components and Objects. LNCS, vol.\u00a06957, pp. 184\u2013203. Springer, Heidelberg (2011)"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Schobbens, P.-Y., Heymans, P., Trigaux, J.-C.: Feature diagrams: A survey and a formal semantics. In: Intern. Conf. on Requirements Engineering (RE), pp. 136\u2013145 (2006)","DOI":"10.1109\/RE.2006.23"},{"key":"15_CR25","unstructured":"Scientific, B.: PACEMAKER System Specification (January 2007)"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Thomas, J.: Extending and automating a systems-theoretic hazard analysis for requirements generation and analysis. Tech. rep., SANDIA National Laboratories (July 2012)","DOI":"10.2172\/1044959"},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Tuan, Zheng, Tho: Modeling and verification of safety critical systems: A case study on pacemaker. In: 4th Conf. on Secure Software Integration and Reliability Improvement, pp. 23\u201332. IEEE (2010)","DOI":"10.1109\/SSIRI.2010.28"},{"issue":"2","key":"15_CR28","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/S0167-6423(02)00039-4","volume":"44","author":"D. Varr\u00f3","year":"2002","unstructured":"Varr\u00f3, D., Varr\u00f3, G., Pataricza, A.: Designing the automatic transformation of visual languages. Science of Computer Programming\u00a044(2), 205\u2013227 (2002)","journal-title":"Science of Computer Programming"},{"key":"15_CR29","unstructured":"Vesely, W.E., Goldberg, F.F., Roberts, N.H., Haasl, D.F.: Fault Tree Handbook. U.S. Nuclear Regulatory Commission, Washington, DC (1981)"}],"container-title":["Lecture Notes in Computer Science","Foundations of Health Information Engineering and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-53956-5_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,25]],"date-time":"2019-05-25T21:12:08Z","timestamp":1558818728000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-53956-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642539558","9783642539565"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-53956-5_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}