{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T06:07:27Z","timestamp":1774937247704,"version":"3.50.1"},"reference-count":15,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2000,3,1]],"date-time":"2000-03-01T00:00:00Z","timestamp":951868800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Reliability Engineering &amp; System Safety"],"published-print":{"date-parts":[[2000,3]]},"DOI":"10.1016\/s0951-8320(99)00075-7","type":"journal-article","created":{"date-parts":[[2002,10,31]],"date-time":"2002-10-31T20:31:40Z","timestamp":1036096300000},"page":"269-274","source":"Crossref","is-referenced-by-count":50,"title":["Quantification of sequential failure logic for fault tree analysis"],"prefix":"10.1016","volume":"67","author":[{"given":"W.","family":"Long","sequence":"first","affiliation":[]},{"given":"Y.","family":"Sato","sequence":"additional","affiliation":[]},{"given":"M.","family":"Horigome","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0951-8320(99)00075-7_BIB1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0951-8320(91)90023-Z","article-title":"Computer-aided fault tree synthesis II (fault tree construction)","volume":"33","author":"Bossche","year":"1991","journal-title":"Reliability Engineering and System Safety"},{"key":"10.1016\/S0951-8320(99)00075-7_BIB2","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1109\/TR.1985.5222114","article-title":"Fault tree analysis, methods, and applications-a review","volume":"34","author":"Lee","year":"1985","journal-title":"IEEE Transactions on Reliability"},{"key":"10.1016\/S0951-8320(99)00075-7_BIB3","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/0951-8320(92)90007-8","article-title":"Expert systems for emergency alarms analysis during accident situations in nuclear reactors","volume":"37","author":"Kobare","year":"1992","journal-title":"Reliability Engineering and System Safety"},{"key":"10.1016\/S0951-8320(99)00075-7_BIB4","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/0951-8320(92)90062-P","article-title":"A comparison of the small and large event tree approaches used in PRAs","volume":"37","author":"Rasmuson","year":"1992","journal-title":"Reliability Engineering and System Safety"},{"key":"10.1016\/S0951-8320(99)00075-7_BIB5","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/S0951-8320(96)00036-1","article-title":"New approaches to evaluating fault trees","volume":"58","author":"Sinnamon","year":"1997","journal-title":"Reliability Engineering and System Safety"},{"key":"10.1016\/S0951-8320(99)00075-7_BIB6","series-title":"Reliability and risk analysis","author":"Modarres","year":"1993"},{"key":"10.1016\/S0951-8320(99)00075-7_BIB7","series-title":"Probabilistic risk assessment","author":"Henley","year":"1993"},{"key":"10.1016\/S0951-8320(99)00075-7_BIB8","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1109\/TR.1976.5220025","article-title":"On the quantitative analysis of priority-AND failure logic","volume":"25","author":"Fussell","year":"1976","journal-title":"IEEE Transactions on Reliability"},{"key":"10.1016\/S0951-8320(99)00075-7_BIB9","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1109\/24.55874","article-title":"An action-chain model for the design of hazard-control systems for robots","volume":"39","author":"Sato","year":"1990","journal-title":"IEEE Transactions on Reliability"},{"key":"10.1016\/S0951-8320(99)00075-7_BIB10","series-title":"Taking into account of dependency relations in the Monte Carlo's simulation of non-coherent fault trees","first-page":"2067","volume":"3","author":"Ngom","year":"1998"},{"key":"10.1016\/S0951-8320(99)00075-7_BIB11","series-title":"A case study of risk analysis for product liability prevention","first-page":"82","volume":"3","author":"Shibata","year":"1998"},{"key":"10.1016\/S0951-8320(99)00075-7_BIB12","doi-asserted-by":"crossref","first-page":"3945","DOI":"10.1299\/jsme1958.29.3945","article-title":"Safety assessment of human-robot systems (Part 3)","volume":"29","author":"Sato","year":"1986","journal-title":"Bulletin of JSME"},{"key":"10.1016\/S0951-8320(99)00075-7_BIB13","series-title":"Mathematica\u2014a system for doing mathematics by computer","author":"Wolfram","year":"1993"},{"key":"10.1016\/S0951-8320(99)00075-7_BIB14","series-title":"A comparison between probabilistic models for quantification of Priority-AND gates","first-page":"1215","volume":"2","author":"Long","year":"1998"},{"key":"10.1016\/S0951-8320(99)00075-7_BIB15","series-title":"Probabilistic risk assessment","first-page":"330","author":"Henley","year":"1993"}],"container-title":["Reliability Engineering &amp; System Safety"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0951832099000757?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0951832099000757?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,15]],"date-time":"2019-04-15T18:26:39Z","timestamp":1555352799000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0951832099000757"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,3]]},"references-count":15,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2000,3]]}},"alternative-id":["S0951832099000757"],"URL":"https:\/\/doi.org\/10.1016\/s0951-8320(99)00075-7","relation":{},"ISSN":["0951-8320"],"issn-type":[{"value":"0951-8320","type":"print"}],"subject":[],"published":{"date-parts":[[2000,3]]}}}