{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T07:40:50Z","timestamp":1725608450865},"publisher-location":"Vienna","reference-count":14,"publisher":"Springer Vienna","isbn-type":[{"type":"print","value":"9783211832820"},{"type":"electronic","value":"9783709163559"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/978-3-7091-6355-9_6","type":"book-chapter","created":{"date-parts":[[2011,9,15]],"date-time":"2011-09-15T07:42:02Z","timestamp":1316072522000},"page":"77-91","source":"Crossref","is-referenced-by-count":11,"title":["ASTRA: An Integrated Tool Set for Complex Systems Dependability Studies"],"prefix":"10.1007","author":[{"given":"S.","family":"Contini","sequence":"first","affiliation":[]},{"given":"S.","family":"Scheer","sequence":"additional","affiliation":[]},{"given":"M.","family":"Wilikens","sequence":"additional","affiliation":[]},{"given":"G.","family":"de Cola","sequence":"additional","affiliation":[]},{"given":"G.","family":"Cojazzi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","volume-title":"Analysis of Complete Logical Structures in System Reliability Assessment, JRC-Ispra, EUR 6886 EN","author":"A Amendola","year":"1980","unstructured":"Amendola, A., Clarotti, C.A., Contini, S., Spizzichino, F. (1980): Analysis of Complete Logical Structures in System Reliability Assessment, JRC-Ispra, EUR 6886 EN"},{"issue":"8","key":"6_CR2","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1109\/TC.1986.1676819","volume":"35","author":"R Bryant","year":"1987","unstructured":"Bryant, R. (1987): Graph Based Algorithms for Boolean Function Manipulation IEEE Transactions on Computer, 35 (8), pp. 677\u2013691","journal-title":"IEEE Transactions on Computer"},{"key":"6_CR3","unstructured":"Caldarola, L., Wichenhauser, W. (1981): The Boolean Algebra with Restricted Variables as a Tool for Fault Tree Modularization, JRC-Karlsruhe, KfK 3190\/EUR 7056e"},{"key":"6_CR4","volume-title":"Proc. Eurodata Conference","author":"CA Clarotti","year":"1983","unstructured":"Clarotti, C.A., De Cola, G., (1983): The Markan Code, in: Proc. Eurodata Conference, Venice, Italy"},{"key":"6_CR5","unstructured":"Contini, S. (1998): ASTRA Theoretical Handbook. JRC-Ispra, SP-report, under publication"},{"key":"6_CR6","unstructured":"Contini, S., Cojazzi, G., Sardellia, R. (1995): Technical Specifications and Algorithms to Adapt ISPRA-FTA for Nuclear Applications, ISEI\/IE\/2936\/95, JRC-Ispra, Technical Note, TN. I.95.6"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Coudert, J.C., Madre, P. (1994): Metaprime: An Interactive Fault Tree Analyser with Binary Decision Diagrams, IEEE Transactions on Reliability, Vol. 43","DOI":"10.1109\/24.285125"},{"key":"6_CR8","volume-title":"Rassegna dei metodi per la determinazione delle caratteristiche affidabilistiche di sistemi non coerenti. JRC-Ispra, Technical Note, TN.I97.131","author":"P Gianotti","year":"1997","unstructured":"Gianotti, P. (1997): Rassegna dei metodi per la determinazione delle caratteristiche affidabilistiche di sistemi non coerenti. JRC-Ispra, Technical Note, TN. I. 97. 131"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Leveson, N., Harvey, P. (1983): Analysing Software Safety, IEEE Transactions on Software Engineering, SE-9, Vol. 5","DOI":"10.1109\/TSE.1983.235116"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Liu, J.C., Pan, Z.J. (1990): A new Method to Calculate the Failure Frequency of Not Coherent Systems. IEEE Transactions on Reliability, Vol. 39 (3)","DOI":"10.1109\/24.103004"},{"key":"6_CR11","first-page":"203","volume-title":"New Algorithms for Fault Tree Analysis. Reliability Engineering and Safety (40)","author":"A Rauzy","year":"1993","unstructured":"Rauzy, A. (1993): New Algorithms for Fault Tree Analysis. Reliability Engineering and Safety (40), pp. 203\u2013211"},{"key":"6_CR12","volume-title":"Aralia Version 1.0: Developers\u2019 Guide. Technical report","author":"A Rauzy","year":"1995","unstructured":"Rauzy, A (1995) Aralia Version 1.0: Developers\u2019 Guide. Technical report, Univers. Bordeaux, LaBRI-URA CNRS 1304"},{"key":"6_CR13","first-page":"37","volume-title":"Proc. SAFECOMP\u201997","author":"S Scheer","year":"1997","unstructured":"Scheer, S., Maier, T. (1997): Towards Dependable Software Requirement Specifications, in: Proc. SAFECOMP\u201997 (ed.: Scheer, S., Maier, T), pp. 37\u201347, York"},{"key":"6_CR14","first-page":"83","volume-title":"Proc. SAFECOMP\u201997","author":"M Wilikens","year":"1997","unstructured":"Wilikens, M., Vallero, D., Masera, M. (1997): Integration of Safety Requirements in the Initial Phases of the Project Lifecycle of Hardware\/Software Systems, in: Proc. SAFECOMP\u201997 (ed.: P. Daniel), pp. 83\u201397, York"}],"container-title":["Tool Support for System Specification, Development and Verification"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-7091-6355-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,15]],"date-time":"2019-06-15T15:19:13Z","timestamp":1560611953000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-7091-6355-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783211832820","9783709163559"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-7091-6355-9_6","relation":{},"subject":[],"published":{"date-parts":[[1999]]}}}