{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T00:00:10Z","timestamp":1767139210354,"version":"build-2238731810"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662449196","type":"print"},{"value":"9783662449202","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44920-2_5","type":"book-chapter","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T05:11:05Z","timestamp":1412053865000},"page":"72-83","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Assuring Dependability of Software Reuse: An Industrial Standard"],"prefix":"10.1007","author":[{"given":"Fevzi","family":"Belli","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,1]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Belli, F., Linschulte, M.: Event-driven modeling and testing of real-time web services. J. Serv. Orient. Comput. Appl. 4(1), 3\u201315. Springer, Heidelberg (2010)","DOI":"10.1007\/s11761-010-0056-5"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Frakes, W. B., Terry, C.: Software reuse: metrics and models. ACM Comput. Surv. 28(2), 415\u2013435 (1996). http:\/\/dl.acm.org\/ft_gateway.cfm?id=234531&type=pdf&CFID=65178775&CFTOKEN=89447410","DOI":"10.1145\/234528.234531"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Frakes, W.B., Kang, K.: Software reuse research: status and future. IEEE Trans. Softw. Eng. 31(7), 529\u2013536 (2005). http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&arnumber=1492369","DOI":"10.1109\/TSE.2005.85"},{"key":"5_CR4","unstructured":"Leveson, N.: Medical devices: the Therac-25. In: Appendix A in Safeware: System Safety and Computers, pp. 1\u201349, Addison-Wesley, Boston (1995). http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download;jsessionid=84A18B532CF53C4AEA6F64AA6038BFEF?doi=10.1.1.39.704&rep=rep1&type=pdf"},{"key":"5_CR5","unstructured":"Lions, J.L.: Ariane 5 Flight 501 Failure (1996). http:\/\/www.ima.umn.edu\/~arnold\/disasters\/ariane5rep.html"},{"key":"5_CR6","volume-title":"Foundations of software Testing","author":"AP Mathur","year":"2008","unstructured":"Mathur, A.P.: Foundations of software Testing. Addison-Wesley Professional, Boston (2008)"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Mohagheghi, P., Ict, S., Conradi, R.: An empirical investigation of software reuse benefits in a large telecom product. ACM Trans. Softw. Eng. Methodol. 17(3), 13:1\u201313:31 (2008). http:\/\/dl.acm.org\/ft_gateway.cfm?id=1363104&type=pdf&CFID=82907429&CFTOKEN=24134248","DOI":"10.1145\/1363102.1363104"},{"key":"5_CR8","doi-asserted-by":"publisher","unstructured":"Mohammad, M., Alagar, V.: A component-based development process for trustworthy systems. J. Softw. Maint. Evol. Res. Pract. (2010) (Wiley InterScience, Published online), doi:10.1002\/smr.472. http:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/smr.472\/pdf","DOI":"10.1002\/smr.472"},{"key":"5_CR9","unstructured":"Naur, P., Randell, B. (eds.): Software Engineering, Report on a Conference Sponsored by the NATO Science Committee, Garmisch, Germany (1968). http:\/\/homepages.cs.ncl.ac.uk\/brian.randell\/NATO\/nato1968.PDF"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Orrego, A., Mundy, G.: SRAE: An integrated framework for aiding in the verification and validation of legacy artifacts in NASA flight control systems. In: Proceedings of the 31st Annual Intertnational Computer Software and Applications Conference. IEEE Computer. Press, New York (2007)","DOI":"10.1109\/COMPSAC.2007.199"},{"key":"5_CR11","volume-title":"Software Engineering","author":"I Sommerville","year":"2007","unstructured":"Sommerville, I.: Software Engineering. Addison Wesley Longman, Boston (2007)"}],"container-title":["Communications in Computer and Information Science","Software Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44920-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T12:35:44Z","timestamp":1712061344000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-44920-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662449196","9783662449202"],"references-count":11,"aliases":["10.1007\/978-3-662-45943-0_5"],"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44920-2_5","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"1 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}