{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T15:25:30Z","timestamp":1767972330630,"version":"3.49.0"},"reference-count":33,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2002,3,1]],"date-time":"2002-03-01T00:00:00Z","timestamp":1014940800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information and Software Technology"],"published-print":{"date-parts":[[2002,3]]},"DOI":"10.1016\/s0950-5849(01)00223-3","type":"journal-article","created":{"date-parts":[[2002,10,14]],"date-time":"2002-10-14T17:55:05Z","timestamp":1034618105000},"page":"137-150","source":"Crossref","is-referenced-by-count":47,"title":["Temporal fault trees"],"prefix":"10.1016","volume":"44","author":[{"given":"Girish Keshav","family":"Palshikar","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0950-5849(01)00223-3_BIB1","first-page":"995","article-title":"Modal and temporal logic","volume":"vol. B","author":"Emerson","year":"1990"},{"key":"10.1016\/S0950-5849(01)00223-3_BIB2","series-title":"Real-time Systems: Specification, Verification and Analysis","first-page":"182","article-title":"Specification and verification in duration calculus","author":"Liu","year":"1996"},{"key":"10.1016\/S0950-5849(01)00223-3_BIB3","doi-asserted-by":"crossref","unstructured":"L. Lamport, TLA in pictures, IEEE Trans. Software Engg 21 (9) (1995) 768\u2013775.","DOI":"10.1109\/32.464544"},{"key":"10.1016\/S0950-5849(01)00223-3_BIB4","doi-asserted-by":"crossref","unstructured":"Y.S. Ramakrishna, L.K. Dillon, L.E. Moser, P.M. Melliar-Smith, G. Kutty, A real-time temporal logic and its decision procedure, Proceedings of FSTTCS 1993, LNCS 761, Springer, Berlin, pp. 173\u2013190.","DOI":"10.1007\/3-540-57529-4_52"},{"issue":"5","key":"10.1016\/S0950-5849(01)00223-3_BIB5","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1093\/logcom\/4.5.531","article-title":"Actions and events in interval temporal logic","volume":"4","author":"Allen","year":"1994","journal-title":"J. Logic Comput."},{"key":"10.1016\/S0950-5849(01)00223-3_BIB6","doi-asserted-by":"crossref","unstructured":"A. Pneuli, Temporal Logic of programs, Proceedings of 18th FOCS, 1977.","DOI":"10.1109\/SFCS.1977.32"},{"issue":"3","key":"10.1016\/S0950-5849(01)00223-3_BIB7","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1109\/32.910858","article-title":"An interval logic for real-time system specification","volume":"27","author":"Mattolini","year":"2001","journal-title":"IEEE Trans. Software Engng"},{"key":"10.1016\/S0950-5849(01)00223-3_BIB8","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/BF01995674","article-title":"Specifying real-time properties with metric temporal logic","volume":"2","author":"Koymans","year":"1990","journal-title":"Real Time Syst. J."},{"issue":"1","key":"10.1016\/S0950-5849(01)00223-3_BIB9","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1145\/174644.174651","article-title":"A really temporal logic","volume":"41","author":"Alur","year":"1994","journal-title":"J. ACM"},{"key":"10.1016\/S0950-5849(01)00223-3_BIB10","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/0304-3975(94)90010-8","article-title":"A theory of timed automata","volume":"126","author":"Alur","year":"1994","journal-title":"Theor. Comput. Sci."},{"issue":"9","key":"10.1016\/S0950-5849(01)00223-3_BIB11","doi-asserted-by":"crossref","first-page":"794","DOI":"10.1109\/32.159837","article-title":"Compiling real-time specifications into extended automata","volume":"18","author":"Nicollin","year":"1992","journal-title":"IEEE Trans. Software Engng"},{"issue":"7","key":"10.1016\/S0950-5849(01)00223-3_BIB12","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/2.596624","article-title":"Executable object modeling with statecharts","volume":"30","author":"Harel","year":"1997","journal-title":"IEEE Comput."},{"issue":"12","key":"10.1016\/S0950-5849(01)00223-3_BIB13","doi-asserted-by":"crossref","first-page":"933","DOI":"10.1109\/32.368134","article-title":"Modechart: a specification language for real-time systems","volume":"20","author":"Jahanian","year":"1994","journal-title":"IEEE Trans. Software Engng"},{"issue":"2","key":"10.1016\/S0950-5849(01)00223-3_BIB14","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1109\/32.265634","article-title":"Proving properties of real-time systems through logical specifications and Petri net models","volume":"20","author":"Felder","year":"1994","journal-title":"IEEE Trans. Software Engng"},{"issue":"3","key":"10.1016\/S0950-5849(01)00223-3_BIB15","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1109\/32.75415","article-title":"Modeling and verification of time-dependent systems using timed Petri nets","volume":"17","author":"Barthomieu","year":"1991","journal-title":"IEEE Trans. Software Engng"},{"issue":"2","key":"10.1016\/S0950-5849(01)00223-3_BIB16","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1109\/32.67597","article-title":"A unified high-level Petri net model for time-critical systems","volume":"17","author":"Gezzi","year":"1991","journal-title":"IEEE Trans. Software Engng"},{"issue":"11","key":"10.1016\/S0950-5849(01)00223-3_BIB17","doi-asserted-by":"crossref","first-page":"1273","DOI":"10.1109\/32.60315","article-title":"Formal analysis of alternating bit protocol by temporal Petri nets","volume":"16","author":"Suzuki","year":"1990","journal-title":"IEEE Trans. Software Engng"},{"issue":"5","key":"10.1016\/S0950-5849(01)00223-3_BIB18","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1109\/32.922714","article-title":"Reduction methods for real-time systems using time delay Petri nets","volume":"17","author":"Juan","year":"2001","journal-title":"IEEE Trans. Software Engng"},{"key":"10.1016\/S0950-5849(01)00223-3_BIB19","unstructured":"US Nuclear Regulatory Commission, Fault Tree Handbook, NUREG-0492, Washington, DC, 1981. See also http:\/\/www.nrc.gov\/NRC\/NUREGS\/ABSTRACTS\/sr0492.html."},{"key":"10.1016\/S0950-5849(01)00223-3_BIB20","doi-asserted-by":"crossref","unstructured":"K. Sullivan, J.B. Dugan, D. Coppit, The Galileo fault tree analysis tool, Proceedings of FTCS 1999, pp. 232\u2013235.","DOI":"10.1109\/FTCS.1999.781056"},{"key":"10.1016\/S0950-5849(01)00223-3_BIB21","unstructured":"Web-sites of some commercial vendors that offer tools related to fault trees: http:\/\/isographdirect.com\/indexft.html, http:\/\/www.iitr.org\/cgi-ac\/ProdDescription?FTA, http:\/\/www.relexsoftware.com\/products\/faulttree.html,http:\/\/www.sydvest.com\/Products\/Cara\/c-ft.html."},{"key":"10.1016\/S0950-5849(01)00223-3_BIB22","series-title":"Safeware: System Safety and Computers","author":"Leveson","year":"1995"},{"issue":"4","key":"10.1016\/S0950-5849(01)00223-3_BIB23","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/52.300036","article-title":"Safety verification of Ada programs using software fault trees","volume":"8","author":"Leveson","year":"1991","journal-title":"IEEE Software"},{"key":"10.1016\/S0950-5849(01)00223-3_BIB24","doi-asserted-by":"crossref","unstructured":"S.-Y. Min, Y.-K. Jan, S.D. Cha, Y.R. Kwon, D.-H. Bae, Safety verification of Ada95 programs using software fault trees, Proceedings of SAFECOMP 1999, pp. 226\u2013238.","DOI":"10.1007\/3-540-48249-0_20"},{"key":"10.1016\/S0950-5849(01)00223-3_BIB25","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1016\/0164-1212(95)00094-1","article-title":"A model-oriented approach to safety analysis using fault trees and a support system","volume":"2","author":"Liu","year":"1996","journal-title":"J. Syst. Software"},{"key":"10.1016\/S0950-5849(01)00223-3_BIB26","doi-asserted-by":"crossref","unstructured":"P. Liggesmeyer, M. Rothfelder, Improving system reliability with automatic fault tree generation, Proceedings of FTCS 1998, pp. 90\u201399.","DOI":"10.1109\/FTCS.1998.689458"},{"key":"10.1016\/S0950-5849(01)00223-3_BIB27","doi-asserted-by":"crossref","unstructured":"A. Bobbio, L. Portinale, M. Minichino, E. Ciancamerla, Comparing fault trees and Bayesian networks for dependability analysis, Proceedings of SAFECOMP 1999, pp. 310\u2013322.","DOI":"10.1007\/3-540-48249-0_27"},{"key":"10.1016\/S0950-5849(01)00223-3_BIB28","series-title":"Reliability of Computer and Control Systems","author":"Viswanadham","year":"1987"},{"key":"10.1016\/S0950-5849(01)00223-3_BIB29","doi-asserted-by":"crossref","unstructured":"J. Magott, P. Skrobanek, A method of analysis of fault trees with time dependencies, Proceedings of SAFECOMP 2000, pp. 176\u2013186.","DOI":"10.1007\/3-540-40891-6_16"},{"key":"10.1016\/S0950-5849(01)00223-3_BIB30","unstructured":"G. Helmer, J. Wong, M. Slagell, V. Honavar, L. Miller, R. Lutz, Software fault tree and colored Petri nets-based specification, design and implementation of agent-based intrusion-detection systems, Proceedings Symposium on Requirements Engineering for Information Security, Indianapolis, IN, USA, March, 2001."},{"issue":"7","key":"10.1016\/S0950-5849(01)00223-3_BIB31","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1109\/32.708570","article-title":"From safety analysis to software requirements","volume":"24","author":"Hansen","year":"1998","journal-title":"IEEE Trans. Software Engng"},{"key":"10.1016\/S0950-5849(01)00223-3_BIB32","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1016\/S0167-8655(00)00127-6","article-title":"A fuzzy temporal notation and its application to specify fault patterns for diagnosis","volume":"22","author":"Palshikar","year":"2001","journal-title":"Pattern Recognition Lett."},{"key":"10.1016\/S0950-5849(01)00223-3_BIB33","series-title":"Programming in Prolog\u2033, 3\/e","author":"Clocksin","year":"1989"}],"container-title":["Information and Software Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584901002233?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584901002233?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,4,8]],"date-time":"2023-04-08T13:54:53Z","timestamp":1680962093000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0950584901002233"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,3]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2002,3]]}},"alternative-id":["S0950584901002233"],"URL":"https:\/\/doi.org\/10.1016\/s0950-5849(01)00223-3","relation":{},"ISSN":["0950-5849"],"issn-type":[{"value":"0950-5849","type":"print"}],"subject":[],"published":{"date-parts":[[2002,3]]}}}