{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T15:14:55Z","timestamp":1725635695234},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540545453"},{"type":"electronic","value":"9783642769306"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1991]]},"DOI":"10.1007\/978-3-642-76930-6_34","type":"book-chapter","created":{"date-parts":[[2011,11,21]],"date-time":"2011-11-21T06:05:29Z","timestamp":1321855529000},"page":"407-418","source":"Crossref","is-referenced-by-count":2,"title":["Testing Fault-Tolerant Protocols by Heuristic Fault Injection"],"prefix":"10.1007","author":[{"given":"Yinong","family":"Chen","sequence":"first","affiliation":[]},{"given":"Klaus","family":"Echtle","sequence":"additional","affiliation":[]},{"given":"Winfried","family":"G\u00f6rke","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1109\/32.44380","volume":"2","author":"J Arlat","year":"1990","unstructured":"J. Arlat, et al.: Fault injection for dependability validation: a methodology and some applications, IEEE Trans. Soft. Eng., SE-16, No. 2, 1990, pp. 166\u2013182.","journal-title":"IEEE Trans. Soft. Eng., SE-16"},{"key":"34_CR2","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1109\/12.54853","volume":"4","author":"JH Barton","year":"1990","unstructured":"J. H. Barton, E. W. Czeck, Z. Z. Sega\u00fc, D. P. Siewiorek: Fault injection experiments using FIAT, IEEE Trans. Computers, C-39, No. 4, April 1990, pp. 575\u2013582.","journal-title":"IEEE Trans. Computers, C-39"},{"key":"34_CR3","first-page":"77","volume":"8302","author":"F Belli","year":"1983","unstructured":"F. Belli: Eine interaktive Methode zur Bestimmung und Sicherung der Zuverl\u00e4ssigkeit von sicherheitsrelevanten Software- Produkten durch Tests, Test und Verifikation von Software bei digitalen Systemen der Luft- und Raumfahrt, DGLR-Bericht 83\u201302, 1983, pp. 77\u2013100.","journal-title":"DGLR-Bericht"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Y. Chen amp; K. EchtJe: Testing fault-tolerant protocols by a fault injection loop, 2th European Workshop on Dependable Computing, Florence, February 1990.","DOI":"10.1007\/978-3-642-76930-6_34"},{"key":"34_CR5","unstructured":"Y. Chen amp; K. Echtte: On Deterministic and Random Fault Injection for Fault-Tolerant Protocol Testing, Interner Bericht, Nr. 4\/91, Fakult\u00e4t fur Informatik, Universit\u00e4t Karlsruhe, M\u00e4rz 1991."},{"key":"34_CR6","unstructured":"K. EchtJe amp; Y. Chen: Evaluation of Deterministic Fault Injection for Fault-Tolerant Protocol Testing, 21th Annual International Symposium on Fault-Tolerant Computing, Montreal, June 1991."},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"K. Echtle: Fehlermodellierung bei Simulation und Verifikation von Fehlertoleranz-Algorithmen f\u00fcr verteilte Systeme; Informatik-Fachberichte, Vol. 83, Springer, Berlin, 1984, pp. 73\u201388.","DOI":"10.1007\/978-3-642-69705-0_7"},{"key":"34_CR8","unstructured":"K. Echtle: Fault-masking with reduced redundant communication, 16th Annual International Symposium on Fault-Tolerant Computing, June 1986, pp. 178\u2013183."},{"key":"34_CR9","unstructured":"K. Echtle: Fault masking and sequence agreement by a voting protocol with low message number; 6th symp. on reliability in distributed software and database systems, 1987, pp. 149\u2013160."},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"K. Echtle: Distance agreement protocols; 19th Annual International Symposium on Fault-Tolerant Computing, June 1989, pp. 191\u2013198.","DOI":"10.1109\/FTCS.1989.105565"},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"W. G\u00f6rke, Fehlertolerante Rechensysteme, Handbuch der Informatik Bd. 2. 1, Oidenbourg, M\u00fcnchen 1989.","DOI":"10.1515\/9783110700916"},{"key":"34_CR12","doi-asserted-by":"crossref","unstructured":"W. E. Howden: Methodology for the generation of program test data, IEEE Trans. Computers, C-24, No.5, may 1975, pp. 554\u2013559.","DOI":"10.1109\/T-C.1975.224259"},{"key":"34_CR13","first-page":"296","volume-title":"Torin: The effects of heavy-ion induced single event upsets in the MC6809E microprocessor; Informatik-Fachberichte, Vol. 214","author":"J Karlsson","year":"1989","unstructured":"J. Karlsson, U. Gunneflo, J. Torin: The effects of heavy-ion induced single event upsets in the MC6809E microprocessor; Informatik-Fachberichte, Vol. 214, Springer, Berlin, 1989, pp. 296\u2013307."},{"key":"34_CR14","first-page":"761","volume":"7","author":"RE Prather","year":"1987","unstructured":"R. E. Prather, J. P. Myers, Jr.: The path prefix software testing strategy, IEEE, Trans. Soft. Eng., SE-13, No. 7, 1987, pp. 761\u2013766.","journal-title":"Jr.: The path prefix software testing strategy, IEEE, Trans. Soft. Eng., SE-13"},{"key":"34_CR15","doi-asserted-by":"crossref","unstructured":"F. Saglietti, W. Ehrenberger: Back-to-back Teststrategien zur Validation fehlertolerierender Software-Systeme; Informatik-Fachberichte, Vol. 167, Springer, Berlin, 1988, pp. 271\u2013280.","DOI":"10.1007\/978-3-642-73445-8_19"},{"issue":"1","key":"34_CR16","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/24.24583","volume":"38","author":"S Venkatesan","year":"1990","unstructured":"S. Venkatesan: Reliable protocols for distributed termination detection, IEEE Trans. Reliability, Vol. 38, No. 1, April 1990, pp. 103\u2013110.","journal-title":"IEEE Trans. Reliability"}],"container-title":["Informatik-Fachberichte","Fault-Tolerant Computing Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-76930-6_34.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T08:30:34Z","timestamp":1639729834000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-76930-6_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1991]]},"ISBN":["9783540545453","9783642769306"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-76930-6_34","relation":{},"ISSN":["0343-3005"],"issn-type":[{"type":"print","value":"0343-3005"}],"subject":[],"published":{"date-parts":[[1991]]}}}