{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,18]],"date-time":"2025-05-18T14:40:07Z","timestamp":1747579207618,"version":"3.40.5"},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[1997,1,1]],"date-time":"1997-01-01T00:00:00Z","timestamp":852076800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1997,1,1]],"date-time":"1997-01-01T00:00:00Z","timestamp":852076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Annals of Software Engineering"],"published-print":{"date-parts":[[1997,1]]},"DOI":"10.1023\/a:1018958526071","type":"journal-article","created":{"date-parts":[[2003,2,19]],"date-time":"2003-02-19T22:07:13Z","timestamp":1045692433000},"page":"65-77","source":"Crossref","is-referenced-by-count":0,"title":["Applying data redundancy to differential equation solvers"],"prefix":"10.1007","volume":"4","author":[{"given":"Paul","family":"Ammann","sequence":"first","affiliation":[]},{"given":"Dahlard L.","family":"Lukes","sequence":"additional","affiliation":[]},{"given":"John C.","family":"Knight","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"326146_CR1","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1109\/12.2185","volume":"37","author":"P. Ammann","year":"1988","unstructured":"Ammann, P. and J. Knight (1988), \u201cData Diversity: An Approach to Software Fault Tolerance,\u201d IEEE Transactions on Computers 37,4, 418\u2013425.","journal-title":"IEEE Transactions on Computers"},{"issue":"12","key":"326146_CR2","doi-asserted-by":"publisher","first-page":"1491","DOI":"10.1109\/TSE.1985.231893","volume":"SE-11","author":"A. Avizienis","year":"1985","unstructured":"Avizienis, A. (1985), \u201cThe N-version Approach to Fault-Tolerant Software,\u201d IEEE Transactions on Software Engineering SE-11,12, 1491\u20131501.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"1","key":"326146_CR3","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1145\/200836.200880","volume":"42","author":"M. Blum","year":"1995","unstructured":"Blum, M. and S. Kannan (1995), \u201cDesigning Program That Check Their Work,\u201d Journal of the ACM 42,1, 269\u2013291.","journal-title":"Journal of the ACM"},{"key":"326146_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-4307-4","volume-title":"Symmetries and Differential Equations","author":"G. Blumen","year":"1989","unstructured":"Blumen, G. and S. Kumei (1989), Symmetries and Differential Equations, Springer, New York."},{"issue":"1","key":"326146_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/32.210303","volume":"19","author":"R.W. Butler","year":"1993","unstructured":"Butler, R.W. and G.B. Finelli (1993), \u201cThe Infeasibility of Quantifying the Reliability of Life-Critical Real-Time Software,\u201d IEEE Transactions on Software Engineering 19,1, 3\u201312.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"12","key":"326146_CR6","doi-asserted-by":"publisher","first-page":"1511","DOI":"10.1109\/TSE.1985.231895","volume":"SE-11","author":"D. Eckhardt Jr.","year":"1985","unstructured":"Eckhardt Jr., D. and L. Lee (1985), \u201cA Theoretical Basis for the Analysis of Multiversion Software Subject to Coincident Errors,\u201d IEEE Transactions on Software Engineering SE-11,12, 1511\u20131517.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"326146_CR7","volume-title":"Numerical Methods","author":"R. Hornbeck","year":"1975","unstructured":"Hornbeck, R. (1975), Numerical Methods, Quantum Publishers, New York, NY."},{"issue":"1-2","key":"326146_CR8","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/0951-8320(91)90046-A","volume":"32","author":"J. Knight","year":"1991","unstructured":"Knight, J. and P. Ammann (1991), \u201cDesigning Fault Tolerance,\u201d Reliability Engineering and System Safety 32,1\u20132, 25\u201349.","journal-title":"Reliability Engineering and System Safety"},{"issue":"1","key":"326146_CR9","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/TSE.1986.6312924","volume":"SE-12","author":"J. Knight","year":"1986","unstructured":"Knight, J. and N. Leveson (1986), \u201cAn Experimental Evaluation of the Assumption of Independence in Multiversion Programming,\u201d IEEE Transactions on Software Engineering SE-12,1, 96\u2013109.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"326146_CR10","volume-title":"Differential Equations: Classical to Controlled","author":"D. Lukes","year":"1982","unstructured":"Lukes, D. (1982), Differential Equations: Classical to Controlled, Academic Press, New York, NY."},{"key":"326146_CR11","first-page":"841","volume-title":"Proceedings of the 1988 International Conference on Advances in Communication and Control","author":"D. Lukes","year":"1988","unstructured":"Lukes, D. (1988), \u201cLie Groups Underlying Fault Avoidance in Dynamical Control Systems,\u201d In Proceedings of the 1988 International Conference on Advances in Communication and Control, Vol. II, Springer, Berlin, Germany, pp. 841\u2013848."},{"key":"326146_CR12","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4684-0274-2","volume-title":"Application of Lie Groups to Differential Equations","author":"P. Olver","year":"1986","unstructured":"Olver, P. (1986), Application of Lie Groups to Differential Equations, Springer, New York, NY."},{"issue":"2","key":"326146_CR13","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1109\/TSE.1975.6312842","volume":"SE-1","author":"B. Randell","year":"1975","unstructured":"Randell, B. (1975), \u201cSystem Structure for Software Fault Tolerance,\u201d IEEE Transactions on Software Engineering SE-1,2, 220\u2013232.","journal-title":"IEEE Transactions on Software Engineering"}],"container-title":["Annals of Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1018958526071.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1018958526071\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1018958526071.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,18]],"date-time":"2025-05-18T14:10:34Z","timestamp":1747577434000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1018958526071"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,1]]},"references-count":13,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1997,1]]}},"alternative-id":["326146"],"URL":"https:\/\/doi.org\/10.1023\/a:1018958526071","relation":{},"ISSN":["1022-7091","1573-7489"],"issn-type":[{"type":"print","value":"1022-7091"},{"type":"electronic","value":"1573-7489"}],"subject":[],"published":{"date-parts":[[1997,1]]}}}