{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T13:21:06Z","timestamp":1768483266283,"version":"3.49.0"},"reference-count":43,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1109\/indin.2012.6300856","type":"proceedings-article","created":{"date-parts":[[2012,9,17]],"date-time":"2012-09-17T16:46:11Z","timestamp":1347900371000},"page":"364-369","source":"Crossref","is-referenced-by-count":5,"title":["Early phase fault propagation analysis of safety critical factory automation systems"],"prefix":"10.1109","author":[{"given":"Nikolaos","family":"Papakonstantinou","sequence":"first","affiliation":[]},{"given":"Seppo","family":"Sierla","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2003.1300273"},{"key":"35","doi-asserted-by":"crossref","DOI":"10.1109\/TSE.2004.23","article-title":"Scaling stepwise refinement","volume":"30","author":"batory","year":"2004","journal-title":"IEEE Transactions on Software Engineering"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.1996.573285"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70770"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2007.4384849"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/1145287.1145289"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2007.4384745"},{"key":"34","author":"clements","year":"2001","journal-title":"Software Product Lines Practices and Patterns"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2003.1247706"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2011.6058977"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2006.275696"},{"key":"14","article-title":"Network management for a safe communication in an unsafe environment","author":"fischer","year":"0","journal-title":"IEEE INDIN Vienna Austria 2007"},{"key":"37","author":"czarnecki","year":"2000","journal-title":"Generative Programming Methods Tools and Applications"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2006.355419"},{"key":"38","article-title":"Formal semantics and verification for feature modeling","author":"sun","year":"0","journal-title":"10th IEEE International Conference on Engineering of Complex Computer Systems Shanghai China 2005"},{"key":"12","article-title":"Architecture of a safe node for a fieldbus system","author":"novak","year":"0","journal-title":"IEEE INDIN Vienna Austria 2007"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/RAMS.2010.5448067"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2006.314582"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070568"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1109\/SPLINE.2007.24"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/SPLC.2008.16"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/REV.2010.5625659"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/EFTA.2007.4416901"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2007.4384905"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2008.4618105"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2008.4638412"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/EFTA.2007.4416910"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.245"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/s00163-010-0086-1"},{"key":"29","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1007\/s00163-002-0024-y","article-title":"Mapping Function to Failure during High-Risk Component Development","volume":"14","author":"tumer","year":"2003","journal-title":"Research in Engineering Design"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/AIM.2010.5695892"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2010.5549700"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2008.4638419"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1115\/1.2885181"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1115\/1.1862678"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.compstruc.2004.10.007"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.2514\/1.39696"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1115\/DETC2011-47767"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1115\/1.2429697"},{"key":"31","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/s00163-001-0008-3","article-title":"A Functional Basis for Engineering Design: Reconciling and Evolving Previous Efforts","volume":"13","author":"hirtz","year":"2002","journal-title":"Research in Engineering Design"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/PL00007198"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2005.844427"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/S0957-4158(03)00042-4"}],"event":{"name":"2012 10th IEEE International Conference on Industrial Informatics (INDIN)","location":"Beijing, China","start":{"date-parts":[[2012,7,25]]},"end":{"date-parts":[[2012,7,27]]}},"container-title":["IEEE 10th International Conference on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6294017\/6300337\/06300856.pdf?arnumber=6300856","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T21:24:38Z","timestamp":1562189078000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6300856\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/indin.2012.6300856","relation":{},"subject":[],"published":{"date-parts":[[2012,7]]}}}