{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T04:06:03Z","timestamp":1743739563961,"version":"3.40.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2012,6,1]],"date-time":"2012-06-01T00:00:00Z","timestamp":1338508800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Autom. Comput."],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1007\/s11633-012-0650-4","type":"journal-article","created":{"date-parts":[[2012,7,6]],"date-time":"2012-07-06T06:10:05Z","timestamp":1341555005000},"page":"315-324","source":"Crossref","is-referenced-by-count":3,"title":["A dependability model for TMR system"],"prefix":"10.1007","volume":"9","author":[{"given":"Jun-Jie","family":"Peng","sequence":"first","affiliation":[]},{"given":"Yan-Ping","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yuan-Yuan","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,7,7]]},"reference":[{"key":"650_CR1","volume-title":"Fault Tolerant Techniques and STRATUS Computer","author":"X. Z. Yang","year":"1993","unstructured":"X. Z. Yang. Fault Tolerant Techniques and STRATUS Computer, Harbin, PRC: Harbin Institute of Technology Publishing House, 1993. (in Chinese)"},{"issue":"3","key":"650_CR2","first-page":"434","volume":"14","author":"J. J. Peng","year":"2005","unstructured":"J. J. Peng, B. R. Hong, C. J. Yuan, A. G. Li, Z. H. Wei. Study on software fault injection based on onboard system. Chinese Journal of Electronics, vol. 14, no. 3, pp. 434\u2013437, 2005.","journal-title":"Chinese Journal of Electronics"},{"key":"650_CR3","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1109\/AERO.1996.495891","volume-title":"Proceedings of the 1996 IEEE Aerospace Applications Conference","author":"Y. C. Yeh","year":"1996","unstructured":"Y. C. Yeh. Triple-triple redundant 777 primary flight computer. In Proceedings of the 1996 IEEE Aerospace Applications Conference, IEEE, Aspen, USA, vol. 1, pp. 293\u2013307, 1996."},{"issue":"3","key":"650_CR4","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1109\/24.974127","volume":"50","author":"S. W. Kwak","year":"2001","unstructured":"S. W. Kwak, B. J. Choi, B. K. Kim. An optimal checkpointing-strategy for real-time control systems under transient faults. IEEE Transactions on Reliability, vol. 50, no. 3, pp. 293\u2013301, 2001.","journal-title":"IEEE Transactions on Reliability"},{"key":"650_CR5","first-page":"80","volume-title":"Proceedings of IEEE International Symposium on Network Computing and Applications","author":"M. A. Al-Hashimi","year":"2001","unstructured":"M. A. Al-Hashimi, H. H. Pu, N. Park, F. Lombardi. Dependability under malicious agreement in N-modular redundancy-on-demand systems. In Proceedings of IEEE International Symposium on Network Computing and Applications, IEEE, Cambridge, USA, pp. 80\u201391, 2001."},{"issue":"8","key":"650_CR6","first-page":"41","volume":"25","author":"D. S. Wang","year":"1997","unstructured":"D. S. Wang, W. M. Zheng, C. L. Wang. Upgrade and degradation reconfiguration for a TMR computer system. Acta Electronica Sinica, vol. 25, no. 8, pp. 41\u201344, 1997. (in Chinese)","journal-title":"Acta Electronica Sinica"},{"key":"650_CR7","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/PRDC.2001.992682","volume-title":"Proceedings of Pacific Rim International Symposium on Dependable Computing","author":"F. Lombardi","year":"2001","unstructured":"F. Lombardi, N. Park, M. Al-Hashimi, H. H. Pu. Modeling the dependability of N-modular redundancy on demand under malicious agreement. In Proceedings of Pacific Rim International Symposium on Dependable Computing, IEEE, Seoul, South Korea, pp. 68\u201375, 2001."},{"issue":"11","key":"650_CR8","first-page":"24","volume":"27","author":"J. Y. Wang","year":"1999","unstructured":"J. Y. Wang, J. Z. Sun, X. Z. Yang. A tool for dependability evaluation of fault-tolerant systems: HFI-2 fault injector. Acta Electronica Sinica, vol. 27, no. 11, pp. 24\u201326, 1999.","journal-title":"Acta Electronica Sinica"},{"issue":"6","key":"650_CR9","doi-asserted-by":"crossref","first-page":"775","DOI":"10.1109\/12.24286","volume":"38","author":"J. B. Dugan","year":"1989","unstructured":"J. B. Dugan, K. S. Trivedi. Coverage modeling for dependability analysis of fault-tolerant systems. IEEE Transactions on Computers, vol. 38, no. 6, pp. 775\u2013787, 1989.","journal-title":"IEEE Transactions on Computers"},{"key":"650_CR10","first-page":"685","volume-title":"Proceedings of the 24th International Conference on Software Engineering","author":"J. C. Knight","year":"2002","unstructured":"J. C. Knight. Dependability of embedded systems. In Proceedings of the 24th International Conference on Software Engineering, IEEE, Orlando, USA, pp. 685\u2013686, 2002."},{"key":"650_CR11","first-page":"400","volume-title":"Proceedings of the 25th International Symposium on Fault-Tolerant Computing","author":"J. Arlat","year":"1995","unstructured":"J. Arlat, Y. Crouzet, J. Laprie. Fault injection for dependability validation of fault-tolerant computing systems. In Proceedings of the 25th International Symposium on Fault-Tolerant Computing, IEEE, Pasadena, USA, pp. 400\u2013407, 1995."},{"issue":"5","key":"650_CR12","first-page":"111","volume":"22","author":"J. Shen","year":"1998","unstructured":"J. Shen, D. Shan. Reliability and safety analysis of TMR computer-based interlocking system. Journal of Northern Jiaotong University, vol. 22, no. 5, pp. 111\u2013114, 1998. (in Chinese)","journal-title":"Journal of Northern Jiaotong University"},{"issue":"1","key":"650_CR13","first-page":"103","volume":"7","author":"L. H. Wang","year":"2002","unstructured":"L. H. Wang, Z. G. Xu, C. L. Wang. Reliability and security analysis of 3-module redundancy system with one maintainable unit. Journal of Southern West Jiaotong University, vol. 7, no. 1, pp. 103\u2013107, 2002. (in Chinese)","journal-title":"Journal of Southern West Jiaotong University"},{"issue":"7","key":"650_CR14","first-page":"119","volume":"35","author":"H. S. Li","year":"2008","unstructured":"H. S. Li, H. S. Xu, Z. H. Ou, Y. G. Yuan. Research on fault recovery techniques for TMR fault-tolerant computing. Journal of Computer Science, vol. 35, no. 7, pp. 119\u2013121, 2008. (in Chinese)","journal-title":"Journal of Computer Science"},{"issue":"7","key":"650_CR15","doi-asserted-by":"crossref","first-page":"707","DOI":"10.1109\/12.780878","volume":"48","author":"M. Cukier","year":"1999","unstructured":"M. Cukier, D. Powell, J. Arlat. Coverage estimation methods for stratified fault-injection. IEEE Transactions on Computers, vol. 48, no. 7, pp. 707\u2013723, 1999.","journal-title":"IEEE Transactions on Computers"},{"issue":"2","key":"650_CR16","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1109\/TIM.2003.822710","volume":"53","author":"H. Hashempour","year":"2004","unstructured":"H. Hashempour, F. J. Meyer, F. Lombardi. Analysis and measurement of fault coverage in a combined ATE and BIST environment. IEEE Transactions on Instrumentation and Measurement, vol. 53, no. 2, pp. 300\u2013307, 2004.","journal-title":"IEEE Transactions on Instrumentation and Measurement"},{"key":"650_CR17","doi-asserted-by":"crossref","unstructured":"S. Blanc, P. J. Gil. Improving the multiple errors detection coverage in distributed embedded systems. In Proceedings of the 22nd International Symposium on Reliable Distributed Systems, IEEE, pp. 303\u2013312, 2003.","DOI":"10.1109\/RELDIS.2003.1238081"},{"key":"650_CR18","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1007\/3-540-40891-6_35","volume-title":"Proceedings of the 19th International Conference on Computer Safety, Reliability and Security","author":"M. A. Sujan","year":"2000","unstructured":"M. A. Sujan, A. Rizzo, A. Pasquini. Dependability evaluation: Model and method based on activity theory. In Proceedings of the 19th International Conference on Computer Safety, Reliability and Security, ACM, London, UK, pp. 406\u2013419, 2000."},{"issue":"2","key":"650_CR19","first-page":"231","volume":"24","author":"B. H. Zhang","year":"2009","unstructured":"B. H. Zhang, Y. Lu, Z. Wei, J. H. Han. Reliability and security analysis of comparison system of double dual-module redundancy. Journal of Systems Engineering, vol. 24, no. 2, pp. 231\u2013237, 2009.","journal-title":"Journal of Systems Engineering"},{"key":"650_CR20","doi-asserted-by":"crossref","unstructured":"B. R. Haverkort. Markovian models for performance and dependability evaluation. Lectures on Formal Methods and Performance Analysis, E. Brinksma, H. Hermanns, J. Katoen, Eds., pp. 38\u201383, 2001.","DOI":"10.1007\/3-540-44667-2_2"},{"key":"650_CR21","first-page":"403","volume-title":"Proceedings of Performance Evaluation: Origins and Directions","author":"G. P. Katerina","year":"2000","unstructured":"G. P. Katerina, T. Kishor. Stochastic modeling formalisms for dependability, performance and performability. In Proceedings of Performance Evaluation: Origins and Directions, ACM, London, UK, pp. 403\u2013422, 2000."},{"issue":"2","key":"650_CR22","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1109\/TR.2002.1011531","volume":"52","author":"L. Meshkat","year":"2002","unstructured":"L. Meshkat, J. B. Dugan, J. D. Andrews. Dependability analysis of systems with on-demand and active failure modes, using dynamic fault trees. IEEE Transactions on Reliability, vol. 52, no. 2, pp. 240\u2013251, 2002.","journal-title":"IEEE Transactions on Reliability"},{"key":"650_CR23","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/DSN.2003.1209918","volume-title":"Proceedings of International Conference on Dependable Systems and Networks","author":"T. Nguyen","year":"2003","unstructured":"T. Nguyen, A. Ourghanlian. Dependability assessment of safety-critical system software by static analysis methods. In Proceedings of International Conference on Dependable Systems and Networks, IEEE, Los Alamitos, USA, pp. 75\u201379, 2003."},{"issue":"4","key":"650_CR24","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1007\/s11633-007-0380-1","volume":"4","author":"S. Prabhudeva","year":"2007","unstructured":"S. Prabhudeva, A. K. Verma. Coverage modeling and reliability analysis using multi-state function. International Journal of Automation and Computing, vol. 4, no. 4, pp. 380\u2013387, 2007.","journal-title":"International Journal of Automation and Computing"},{"key":"650_CR25","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/229000.226305","volume-title":"Proceedings of the 1996 International Symposium on Software Testing and Analysis","author":"D. Hamlet","year":"1996","unstructured":"D. Hamlet. Predicting dependability by testing. In Proceedings of the 1996 International Symposium on Software Testing and Analysis, ACM, Mission Beach, USA, pp. 84\u201391, 1996."},{"issue":"3","key":"650_CR26","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1023\/A:1023796929359","volume":"19","author":"H. Cui","year":"2003","unstructured":"H. Cui, S. C. Seth. Modeling fault coverage of random test patterns. Journal of Electronic Testing: Theory and Applications, vol. 19, no. 3, pp. 271\u2013284, 2003.","journal-title":"Journal of Electronic Testing: Theory and Applications"},{"key":"650_CR27","doi-asserted-by":"crossref","unstructured":"M. A. Fecko, M. U. Uyar, A. Y. Duale. Towards testing SDL specifications: Models and fault coverage for concurrent timers. In Proceedings of the 23rd International Conference on Formal Techniques for Networked and Distributed Systems, Berlin, Germany, pp. 273\u2013288, 2003.","DOI":"10.1007\/978-3-540-39979-7_18"},{"issue":"2","key":"650_CR28","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/s11633-006-0145-2","volume":"3","author":"O. Hryniewicz","year":"2006","unstructured":"O. Hryniewicz. An evaluation of the reliability of complex systems using shadowed sets and fuzzy lifetime data. International Journal of Automation and Computing, vol.3, no. 2, pp. 145\u2013150, 2006.","journal-title":"International Journal of Automation and Computing"},{"key":"650_CR29","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1109\/IPDS.1995.395829","volume-title":"Proceedings of International Computer Performance and Dependability Symposium","author":"N. A. Kanawati","year":"1995","unstructured":"N. A. Kanawati, G. A. Kanawati, J. A. Abraham. Dependability evaluation using hybrid fault\/error injection. In Proceedings of International Computer Performance and Dependability Symposium, ACM, Washington, USA, pp. 224\u2013233, 1995."}],"container-title":["International Journal of Automation and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-012-0650-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11633-012-0650-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-012-0650-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T09:33:34Z","timestamp":1743672814000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11633-012-0650-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,6]]}},"alternative-id":["650"],"URL":"https:\/\/doi.org\/10.1007\/s11633-012-0650-4","relation":{},"ISSN":["1476-8186","1751-8520"],"issn-type":[{"type":"print","value":"1476-8186"},{"type":"electronic","value":"1751-8520"}],"subject":[],"published":{"date-parts":[[2012,6]]}}}