{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:32:53Z","timestamp":1773329573488,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1109\/indin.2012.6300900","type":"proceedings-article","created":{"date-parts":[[2012,9,17]],"date-time":"2012-09-17T16:46:11Z","timestamp":1347900371000},"page":"1092-1097","source":"Crossref","is-referenced-by-count":14,"title":["Runtime safety analysis for safe reconfiguration"],"prefix":"10.1109","author":[{"given":"Claudia","family":"Priesterjahn","sequence":"first","affiliation":[]},{"given":"Christian","family":"Heinzemann","sequence":"additional","affiliation":[]},{"given":"Wilhelm","family":"Schafer","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Tichy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1772643.1772660"},{"key":"13","article-title":"Reachability analysis on timed graph transformation systems","author":"heinzemann","year":"0","journal-title":"Proc of the Fourth International Workshop on Graph-based Tools Enschede the Netherlands 2010"},{"key":"14","first-page":"57","article-title":"Isomorphism Checking in GROOVE","author":"rensik","year":"2007","journal-title":"Graph-Based Tools (GraBaTs)"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"12","author":"tanenbaum","year":"2008","journal-title":"Distributed Systems Principles and Paradigms"},{"key":"3","first-page":"123","article-title":"Online Efficient Predictive Safety Analysis of Multithreaded Programs","author":"sen","year":"2004","journal-title":"LNCS"},{"key":"2","author":"storey","year":"1996","journal-title":"Safety Critical Computer Systems"},{"key":"1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-02161-9_1","author":"cheng","year":"2009","journal-title":"Software Engineering for Self-Adaptive Systems"},{"key":"10","article-title":"Component-based hazard analysis: Optimal designs, product lines, and online reconfiguration","author":"giese","year":"0","journal-title":"Proc of the 25th SafeComp Gdansk Poland 2006"},{"key":"7","author":"becker","year":"2011","journal-title":"MechatronicUML - Syntax and Semantics"},{"key":"6","article-title":"Modeling safe reconfiguration with the FUJABA Real-time Tool Suite","author":"priesterjahn","year":"0","journal-title":"Proc of the 7th International Fujaba Days Eindhoven the Netherlands 2009"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1808984.1808989"},{"key":"4","author":"rushby","year":"2008","journal-title":"Runtime Verification"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s00450-011-0184-y"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1142\/9789812384720"}],"event":{"name":"2012 10th IEEE International Conference on Industrial Informatics (INDIN)","location":"Beijing, China","start":{"date-parts":[[2012,7,25]]},"end":{"date-parts":[[2012,7,27]]}},"container-title":["IEEE 10th International Conference on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6294017\/6300337\/06300900.pdf?arnumber=6300900","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T20:20:50Z","timestamp":1497990050000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6300900\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/indin.2012.6300900","relation":{},"subject":[],"published":{"date-parts":[[2012,7]]}}}