{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T18:37:00Z","timestamp":1725734220017},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1109\/date.2008.4484802","type":"proceedings-article","created":{"date-parts":[[2008,4,15]],"date-time":"2008-04-15T18:15:51Z","timestamp":1208283351000},"page":"947-952","source":"Crossref","is-referenced-by-count":6,"title":["Software Protection Mechanisms for Dependable Systems"],"prefix":"10.1109","author":[{"given":"Ute","family":"Wappler","sequence":"first","affiliation":[]},{"given":"Martin","family":"Muller","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-75101-4_34","article-title":"software encoded processing: building dependable systems with commodity hardware","author":"wappler","year":"2007","journal-title":"The 26th International Conference on Computer Safety Reliability and Security (SafeComp 2007)"},{"key":"15","article-title":"algorithm based fault tolerance : review and experimental study","author":"stefanidis","year":"2004","journal-title":"International Conference on Numerical Analysis and Applied Mathematics"},{"year":"0","key":"16"},{"key":"13","article-title":"configurable transient fault detection via dynamic binary translation","author":"reis","year":"2006","journal-title":"Proceedings of the 2nd Workshop on Architectural Reliability (WAR)"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2005.34"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/12.980007"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.1109\/SCAM.2001.972664","article-title":"a source-to-source compiler for generating dependable software","author":"rebaudengo","year":"2001","journal-title":"Proceedings First IEEE International Workshop on Source Code Analysis and Manipulation SCAM-01"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2006.33"},{"key":"2","article-title":"will radiation-hardening-by-design (rhbd) work? nuclear and plasma sciences","author":"barnaby","year":"2005","journal-title":"Society News"},{"key":"1","article-title":"design and evaluation of preemptive control signature(pecos) checking","author":"bagchi","year":"2003","journal-title":"IEEE Transactions on Computers"},{"year":"0","key":"10"},{"key":"7","article-title":"vital coded microprocessor principles and application for various transit systems","author":"forin","year":"1989","journal-title":"IFA-GCCT"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.1996.618609"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2006.15"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2005.110"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"journal-title":"Patent System und Verfahren zur Verbesserung von Fehlerbeherrschungsmassnahmen insbesondere in Automatisierungssystemen","year":"2002","author":"kru?ger","key":"8"}],"event":{"name":"2008 Design, Automation and Test in Europe","start":{"date-parts":[[2008,3,10]]},"location":"Munich, Germany","end":{"date-parts":[[2008,3,14]]}},"container-title":["2008 Design, Automation and Test in Europe"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4475437\/4484624\/04484802.pdf?arnumber=4484802","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T02:55:55Z","timestamp":1497754555000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4484802\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/date.2008.4484802","relation":{},"subject":[],"published":{"date-parts":[[2008,3]]}}}