{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:10:26Z","timestamp":1740132626341,"version":"3.37.3"},"reference-count":16,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/mc.2019.2958907","type":"journal-article","created":{"date-parts":[[2020,6,3]],"date-time":"2020-06-03T20:22:22Z","timestamp":1591215742000},"page":"28-33","source":"Crossref","is-referenced-by-count":2,"title":["Reliability Inversion: A Cautionary Tale"],"prefix":"10.1109","volume":"53","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8093-6436","authenticated-orcid":false,"given":"Behrooz","family":"Parhami","sequence":"first","affiliation":[{"name":"Electrical and Computer Engineering, University of California, Santa Barbara, California United States"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DFTVS.2004.1347875"},{"journal-title":"Dependable computing A multilevel approach","year":"2019","author":"parhami","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.parco.2013.04.005"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.114"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0194"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1587\/elex.13.20160930"},{"article-title":"Reliability and modelability advantages of distributed switching for reconfigurable 2D processor arrays","year":"0","author":"parhami","key":"ref16"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/59368.59374"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/2.206519"},{"journal-title":"Drift into Failure From Hunting Broken Components to Understanding Complex Systems","year":"2011","author":"dekker","key":"ref6"},{"key":"ref5","article-title":"What really happened on Mars","volume":"19","author":"reeves","year":"1998","journal-title":"Risks Digest"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1986.13533"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/2.48799"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/BF01580204"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-54233-7_130"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.57071\/124ure","author":"zio","year":"2013","journal-title":"Methods for representing uncertainty A literature review"}],"container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/2\/9107270\/09107272.pdf?arnumber=9107272","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T22:29:00Z","timestamp":1696199340000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9107272\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":16,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/mc.2019.2958907","relation":{},"ISSN":["0018-9162","1558-0814"],"issn-type":[{"type":"print","value":"0018-9162"},{"type":"electronic","value":"1558-0814"}],"subject":[],"published":{"date-parts":[[2020,6]]}}}