{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T12:09:50Z","timestamp":1648642190852},"reference-count":13,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2002,5,1]],"date-time":"2002-05-01T00:00:00Z","timestamp":1020211200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2002,5]]},"DOI":"10.1016\/s0164-1212(01)00133-9","type":"journal-article","created":{"date-parts":[[2002,10,14]],"date-time":"2002-10-14T20:48:11Z","timestamp":1034628491000},"page":"47-57","source":"Crossref","is-referenced-by-count":2,"title":["Designing a resourceful fault-tolerance system"],"prefix":"10.1016","volume":"62","author":[{"given":"Ray","family":"Giguette","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Johnette","family":"Hassell","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/S0164-1212(01)00133-9_BIB1","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1145\/78949.78951","article-title":"Resourceful systems for fault tolerance, reliability, and safety","volume":"22","author":"Abbott","year":"1990","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/S0164-1212(01)00133-9_BIB2","series-title":"Proceedings of the First IEEE International Computer Science Applications Conference, Chicago, IL, November 1977","first-page":"149","article-title":"On the implementation of N-version programming for software fault tolerance during execution","author":"Avizienis","year":"1977"},{"key":"10.1016\/S0164-1212(01)00133-9_BIB3","series-title":"Proceedings of the Southeast Regional ACM Conference, April 1999","first-page":"66","article-title":"Toward a resourceful method of software fault tolerance","author":"Giguette","year":"1999"},{"key":"10.1016\/S0164-1212(01)00133-9_BIB4","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/0164-1212(90)90063-R","article-title":"The use of executable assertions for error detection and damage assessment","volume":"12","author":"Jaoua","year":"1990","journal-title":"The Journal of Systems and Software"},{"key":"10.1016\/S0164-1212(01)00133-9_BIB5","series-title":"ACM SIGPLAN Symposium on Data Structures of Programming Languages, University of Florida, Gainesville, February 1971","first-page":"55","article-title":"The contour model of block structured processes","volume":"6","author":"Johnston","year":"1971"},{"issue":"7","key":"10.1016\/S0164-1212(01)00133-9_BIB6","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/52.300038","article-title":"Implementing design diversity to achieve fault tolerance","volume":"8","author":"Kelly","year":"1991","journal-title":"IEEE Software"},{"key":"10.1016\/S0164-1212(01)00133-9_BIB7","series-title":"Proceedings of the 1998 International Conference on Software Engineering","first-page":"53","article-title":"Integrating obstacles in goal-driven requirements engineering","author":"Lamsweerde","year":"1998"},{"issue":"5","key":"10.1016\/S0164-1212(01)00133-9_BIB8","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1109\/TSE.1983.235116","article-title":"Analyzing software safety","volume":"9","author":"Leveson","year":"1983","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"7","key":"10.1016\/S0164-1212(01)00133-9_BIB9","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/2.56849","article-title":"Fault-tolerant computing: fundamental concepts","volume":"23","author":"Nelson","year":"1990","journal-title":"IEEE Computer"},{"issue":"2","key":"10.1016\/S0164-1212(01)00133-9_BIB10","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1109\/TSE.1975.6312842","article-title":"Software structure for software fault tolerance","volume":"1","author":"Randell","year":"1975","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/S0164-1212(01)00133-9_BIB11","series-title":"Proceedings of the 1997 International Conference on Software Engineering","first-page":"250","article-title":"Software deviation analysis","author":"Reese","year":"1997"},{"issue":"1","key":"10.1016\/S0164-1212(01)00133-9_BIB12","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/32.341844","article-title":"A practical approach to programming with assertions","volume":"21","author":"Rosenblum","year":"1995","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"6","key":"10.1016\/S0164-1212(01)00133-9_BIB13","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1109\/TSE.1980.234507","article-title":"Redundancy in data structures: improving software fault tolerance","volume":"6","author":"Taylor","year":"1980","journal-title":"IEEE Transactions on Software Engineering"}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121201001339?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121201001339?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T19:50:06Z","timestamp":1556567406000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0164121201001339"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,5]]},"references-count":13,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2002,5]]}},"alternative-id":["S0164121201001339"],"URL":"https:\/\/doi.org\/10.1016\/s0164-1212(01)00133-9","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[2002,5]]}}}