{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T19:03:46Z","timestamp":1745003026073},"reference-count":22,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/dsn.2002.1028894","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T18:14:31Z","timestamp":1056564871000},"page":"135-144","source":"Crossref","is-referenced-by-count":32,"title":["On the placement of software mechanisms for detection of data errors"],"prefix":"10.1109","author":[{"given":"M.","family":"Hiller","sequence":"first","affiliation":[]},{"given":"A.","family":"Jhumka","sequence":"additional","affiliation":[]},{"given":"N.","family":"Suri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"1986","key":"19","article-title":"MIL-SPEC: Aircraft arresting system BAK-12A\/E32A; portable, rotary friction"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.1998.682161"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1999.781030"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1997.614096"},{"journal-title":"Computer Logic Testing and Verification","year":"1980","author":"roth","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.1977.748932"},{"key":"13","first-page":"77","article-title":"Perturbation analysis of computer programs","author":"morell","year":"1997","journal-title":"Proc COMPASS'97"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/12.364537"},{"key":"11","first-page":"42","article-title":"Dependable computing: Concepts, limits, challenges","author":"laprie","year":"1995","journal-title":"Proc FTCS-25"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.2514\/6.1984-2726"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/32.153381"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/12.780878"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.1990.117838"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1989.105592"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/32.44380"},{"key":"10","article-title":"Experimental analysis of computer system dependability","author":"iyer","year":"1996","journal-title":"Chapter 5 in Fault-Tolerant Computer System Design"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSN.2000.857510"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1981.1675757"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/FTCSH.1995.532658"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/DCFTS.1999.814288"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2001.941402"},{"article-title":"A tool for examining the behavior of faults and errors in software","year":"2000","author":"hiller","key":"8"}],"event":{"name":"International Conference on Dependable Systems and Networks","acronym":"DSN-02","location":"Washington, DC, USA"},"container-title":["Proceedings International Conference on Dependable Systems and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7991\/22107\/01028894.pdf?arnumber=1028894","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,10]],"date-time":"2017-03-10T11:11:19Z","timestamp":1489144279000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1028894\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/dsn.2002.1028894","relation":{},"subject":[]}}