{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:29:12Z","timestamp":1730284152796,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/mwscas.2016.7869962","type":"proceedings-article","created":{"date-parts":[[2017,3,7]],"date-time":"2017-03-07T14:33:58Z","timestamp":1488897238000},"page":"1-4","source":"Crossref","is-referenced-by-count":5,"title":["Error analysis and reliability metrics for software in safety critical systems"],"prefix":"10.1109","author":[{"given":"Jonathan","family":"Lockhart","sequence":"first","affiliation":[]},{"given":"Carla","family":"Purdy","sequence":"additional","affiliation":[]},{"given":"Philip A.","family":"Wilsey","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Regression Analysis How to Interpret S the Standard Error of the Regression","year":"2014","author":"frost","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24808-8_10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/0026-2714(83)91372-0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/52.28120"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.28"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1995.466956"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICRITO.2015.7359222"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2009.5316048"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PACC.2011.5978957"},{"key":"ref18","article-title":"The personal software process (psp)","author":"watts","year":"2000","journal-title":"Technical Report CMU\/SEI-2000-022"},{"journal-title":"The Personal Software Process an Independent Study","year":"2000","author":"putz","key":"ref19"},{"journal-title":"Yasca","year":"0","author":"scovetta","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/69605.2085"},{"journal-title":"Clang Static Analyzer","year":"0","key":"ref27"},{"journal-title":"High bandwidth memory Reinventing memory technology","year":"2015","key":"ref3"},{"key":"ref6","article-title":"Reliability Report 60","author":"altera","year":"2015","journal-title":"Intel Technical Report"},{"journal-title":"Multiple Regression Analysis Use Adjusted R-Squared and Predicted R-Squared to Include the Correct Number of Variables","year":"2013","author":"frost","key":"ref29"},{"journal-title":"How Many Defects Are Too Many?","year":"2014","author":"finzer","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TR.1979.5220561"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2014.6908387"},{"journal-title":"AMD Dives Deep On High Bandwith Memory - What Will HMB Bring AMD","year":"2015","author":"smith","key":"ref2"},{"key":"ref9","first-page":"35","article-title":"Reliability Theory Applied to Software Testing","volume":"38","author":"drake","year":"1987","journal-title":"Hewlett-Packard Journal"},{"journal-title":"Moore's Law Running Out of Room Tech Looks for a Successor","year":"2016","author":"markoff","key":"ref1"},{"journal-title":"Chapter 2 Lesson 2 Planning and Measurement","year":"2000","author":"putz","key":"ref20"},{"key":"ref22","article-title":"Testu01 a software library in ansi c for emperical testing of random number generators","author":"l'ecuyer","year":"2013","journal-title":"D&#x00E9;partement d'Informatique et de Recherche Op&#x00E9;rationnelle Universit&#x00E9; de Montr&#x00E9;al Tech Rep"},{"key":"ref21","article-title":"Peg: A family of simple fast space-efficient statistically good algorithms for random number generation","author":"o'neill","year":"0","journal-title":"ACM Trans Math Softw"},{"key":"ref24","first-page":"98","article-title":"Studies in Z Style","author":"spivey","year":"1988","journal-title":"Understanding Z A Specification Language and Its Formal Semantics"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1268776.1268777"},{"journal-title":"Splint","year":"0","key":"ref26"},{"key":"ref25","first-page":"5","article-title":"Getting Started","author":"lemma","year":"2006","journal-title":"ProofPower Z Tutorial"}],"event":{"name":"2016 IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS)","start":{"date-parts":[[2016,10,16]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2016,10,19]]}},"container-title":["2016 IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7862453\/7869936\/07869962.pdf?arnumber=7869962","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,10]],"date-time":"2017-03-10T21:40:20Z","timestamp":1489182020000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7869962\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/mwscas.2016.7869962","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}