{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T15:20:09Z","timestamp":1746026409460},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cmpsac.2004.1342860","type":"proceedings-article","created":{"date-parts":[[2004,11,8]],"date-time":"2004-11-08T11:28:24Z","timestamp":1099913304000},"page":"368-375","source":"Crossref","is-referenced-by-count":4,"title":["Safety tactics for software architecture design"],"prefix":"10.1109","author":[{"family":"Weihang Wu","sequence":"first","affiliation":[]},{"given":"T.","family":"Kelly","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","first-page":"2\/1","article-title":"from memory to monitor-pixel display architectures","author":"storey","year":"1992","journal-title":"Computer Graphics Systems IEE Colloquium on"},{"journal-title":"Software Architecture Perspectives on an Emerging Discipline","year":"1996","author":"shaw","key":"13"},{"key":"14","article-title":"A classification of faults in systems","author":"shrivastava","year":"1989","journal-title":"Technical Report"},{"journal-title":"Safeware System Safety and Computers","year":"1995","author":"leveson","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/381766.381770"},{"key":"3","article-title":"Quality attribute design primitives","author":"bass","year":"2000","journal-title":"Technical Report"},{"key":"2","article-title":"Deriving architectural tactics: A step toward methodical architectural design","author":"bachmann","year":"2003","journal-title":"Technical Report"},{"key":"1","article-title":"Illuminating the fundamental contributors to software architecture quality","author":"bachmann","year":"2002","journal-title":"Technical Report"},{"key":"10","first-page":"37","author":"lemos","year":"2003","journal-title":"Architecting Dependable Systems"},{"key":"7","article-title":"Failure propagation and transformation notation - Handbook and user guide","author":"fenelon","year":"1993","journal-title":"High Integrity Systems Engineering Group Technical Report"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/FTDCS.1990.138293"},{"journal-title":"Dependability of Critical Computer Systems 3 Techniques Directory","year":"1990","author":"bishop","key":"5"},{"journal-title":"Software Architecture in Practice 2nd Edition","year":"2003","author":"bass","key":"4"},{"journal-title":"Arguing Safety - A Systematic Approach To Managing Safety Cases","year":"1998","author":"kelly","key":"9"},{"journal-title":"615038 - Functional Safety of Electrical\/Electronic\/Programmable Electronic Safety-related Systems","year":"1998","key":"8"}],"event":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","location":"Hong Kong"},"container-title":["Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9304\/29570\/01342860.pdf?arnumber=1342860","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T12:23:38Z","timestamp":1489494218000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1342860\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/cmpsac.2004.1342860","relation":{},"subject":[]}}