{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:42Z","timestamp":1750306122827,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,4,18]],"date-time":"2017-04-18T00:00:00Z","timestamp":1492473600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"TUM International Graduate School of Science and Engi- neering"},{"DOI":"10.13039\/100000001","name":"National Science Foundation (NSF)","doi-asserted-by":"publisher","award":["CNS-1302563"],"award-info":[{"award-number":["CNS-1302563"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"German Research Foun- dation","award":["ZA 873\/1-1"],"award-info":[{"award-number":["ZA 873\/1-1"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS- 1646383"],"award-info":[{"award-number":["CNS- 1646383"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,4,18]]},"DOI":"10.1145\/3055004.3055012","type":"proceedings-article","created":{"date-parts":[[2017,4,10]],"date-time":"2017-04-10T12:27:28Z","timestamp":1491827248000},"page":"197-206","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Application and system-level software fault tolerance through full system restarts"],"prefix":"10.1145","author":[{"given":"Fardin","family":"Abdi","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Rohan","family":"Tabish","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Matthias","family":"Rungger","sequence":"additional","affiliation":[{"name":"Technical University of Munich, Germany"}]},{"given":"Majid","family":"Zamani","sequence":"additional","affiliation":[{"name":"Technical University of Munich, Germany"}]},{"given":"Marco","family":"Caccamo","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]}],"member":"320","published-online":{"date-parts":[[2017,4,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/www.freertos.org. (2016). Accessed","author":"RTOS","year":"2016","unstructured":"2016. Free RTOS . http:\/\/www.freertos.org. (2016). Accessed : Sep. 2016 . 2016. FreeRTOS . http:\/\/www.freertos.org. (2016). Accessed: Sep. 2016."},{"volume-title":"16-channel, 12-bit PWM Fm+ I2C-bus LED controller. https:\/\/goo.gl\/FMnOQT. (2016). Accessed","year":"2016","unstructured":"2016. PCA9685 : 16-channel, 12-bit PWM Fm+ I2C-bus LED controller. https:\/\/goo.gl\/FMnOQT. (2016). Accessed : Oct. 2016 . 2016. PCA9685: 16-channel, 12-bit PWM Fm+ I2C-bus LED controller. https:\/\/goo.gl\/FMnOQT. (2016). Accessed: Oct. 2016.","key":"e_1_3_2_1_2_1"},{"unstructured":"2017. https:\/\/github.com\/abditag2\/reset-based-recovery. (2017).  2017. https:\/\/github.com\/abditag2\/reset-based-recovery. (2017).","key":"e_1_3_2_1_3_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1109\/ETFA.2016.7733561"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1109\/RTAS.2009.20"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/RTSS.2014.21"},{"volume-title":"Set-theoretic methods in control","author":"Blanchini Franco","unstructured":"Franco Blanchini and Stefano Miani . 2008. Set-theoretic methods in control . Springer , 156--163. Franco Blanchini and Stefano Miani. 2008. Set-theoretic methods in control.Springer, 156--163.","key":"e_1_3_2_1_7_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1016\/j.peva.2003.07.007"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/HOTOS.2001.990072"},{"key":"e_1_3_2_1_10_1","volume-title":"Crash-Only Software. In HotOS IX: The 9th Workshop on Hot Topics in Operating Systems. 67--72","author":"Candea George","year":"2003","unstructured":"George Candea and Armando Fox . 2003 . Crash-Only Software. In HotOS IX: The 9th Workshop on Hot Topics in Operating Systems. 67--72 . George Candea and Armando Fox. 2003. Crash-Only Software. In HotOS IX: The 9th Workshop on Hot Topics in Operating Systems. 67--72."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation -","volume":"6","author":"Candea George","year":"2004","unstructured":"George Candea , Shinichi Kawamoto , Yuichi Fujiki , Greg Friedman , and Armando Fox . 2004 . Microreboot-A Technique for Cheap Recovery . In Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation - Volume 6 (OSDI'04). 3--3. George Candea, Shinichi Kawamoto, Yuichi Fujiki, Greg Friedman, and Armando Fox. 2004. Microreboot-A Technique for Cheap Recovery. In Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation - Volume 6 (OSDI'04). 3--3."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/ACW.2003.1210217"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/RTSS.2007.34"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/ISSRE.1995.497656"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/FTCS.1995.466961"},{"unstructured":"ARM Inc. ARM Trust Zone. (????).  ARM Inc. ARM Trust Zone. (????).","key":"e_1_3_2_1_16_1"},{"unstructured":"Quanser Inc. 3DOF Helicopter. (????).  Quanser Inc. 3DOF Helicopter. (????).","key":"e_1_3_2_1_17_1"},{"unstructured":"Quanser Inc. Q8 Data Acquisition Board. (????).  Quanser Inc. Q8 Data Acquisition Board. (????).","key":"e_1_3_2_1_18_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/ISORC.2008.25"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/2461446.2461456"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1109\/TAC.2016.2593947"},{"key":"e_1_3_2_1_22_1","volume-title":"Computing Robust Controlled Invariant Sets of Linear Systems. CoRR abs\/","author":"Rungger Matthias","year":"2016","unstructured":"Matthias Rungger and Paulo Tabuada . 2016. Computing Robust Controlled Invariant Sets of Linear Systems. CoRR abs\/ ( 2016 ). http:\/\/arxiv.org\/abs\/1601.00416 Matthias Rungger and Paulo Tabuada. 2016. Computing Robust Controlled Invariant Sets of Linear Systems. CoRR abs\/ (2016). http:\/\/arxiv.org\/abs\/1601.00416"},{"doi-asserted-by":"crossref","unstructured":"Danbing Seto and Lui Sha. 1999. An engineering method for safety region development. (1999).  Danbing Seto and Lui Sha. 1999. An engineering method for safety region development. (1999).","key":"e_1_3_2_1_23_1","DOI":"10.21236\/ADA367624"},{"key":"e_1_3_2_1_24_1","volume-title":"Real-Time Systems Symposium, 1998. Proceedings., The 19th IEEE. IEEE, 440--448","author":"Sha Lui","year":"1998","unstructured":"Lui Sha . 1998 . Dependable system upgrade . In Real-Time Systems Symposium, 1998. Proceedings., The 19th IEEE. IEEE, 440--448 . Lui Sha. 1998. Dependable system upgrade. In Real-Time Systems Symposium, 1998. Proceedings., The 19th IEEE. IEEE, 440--448."},{"volume-title":"Using simplicity to control complexity","author":"Sha Lui","unstructured":"Lui Sha . 2001. Using simplicity to control complexity . IEEE Software , 20--28. Lui Sha. 2001. Using simplicity to control complexity. IEEE Software, 20--28.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","volume-title":"Aerospace Applications Conference, 1996. Proceedings.","volume":"1","author":"Sha Lui","year":"1996","unstructured":"Lui Sha , Ragunathan Rajkumar , and Michael Gagliardi . 1996 . Evolving dependable real-time systems . In Aerospace Applications Conference, 1996. Proceedings. , 1996 IEEE, Vol. 1 . IEEE, 335--346. Lui Sha, Ragunathan Rajkumar, and Michael Gagliardi. 1996. Evolving dependable real-time systems. In Aerospace Applications Conference, 1996. Proceedings., 1996 IEEE, Vol. 1. IEEE, 335--346."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1109\/SEAA.2014.25"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1007\/978-1-4419-0224-5"},{"key":"e_1_3_2_1_29_1","first-page":"124","article-title":"A comprehensive model for software rejuvenation. Dependable and Secure Computing","volume":"2","author":"Vaidyanathan Kalyanaraman","year":"2005","unstructured":"Kalyanaraman Vaidyanathan and Kishor S Trivedi . 2005 . A comprehensive model for software rejuvenation. Dependable and Secure Computing , IEEE Transactions on 2 , 2 (2005), 124 -- 137 . Kalyanaraman Vaidyanathan and Kishor S Trivedi. 2005. A comprehensive model for software rejuvenation. Dependable and Secure Computing, IEEE Transactions on 2, 2 (2005), 124--137.","journal-title":"IEEE Transactions on"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1109\/RTCSA.2016.17"}],"event":{"acronym":"ICCPS '17","name":"ICCPS '17: ACM\/IEEE 8th International Conference on Cyber-Physical Systems","location":"Pittsburgh Pennsylvania"},"container-title":["Proceedings of the 8th International Conference on Cyber-Physical Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3055004.3055012","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3055004.3055012","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3055004.3055012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:51Z","timestamp":1750217811000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3055004.3055012"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,18]]},"references-count":30,"alternative-id":["10.1145\/3055004.3055012","10.1145\/3055004"],"URL":"https:\/\/doi.org\/10.1145\/3055004.3055012","relation":{},"subject":[],"published":{"date-parts":[[2017,4,18]]},"assertion":[{"value":"2017-04-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}