{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:21:16Z","timestamp":1729675276714,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/issre.2014.30","type":"proceedings-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T18:44:54Z","timestamp":1419965094000},"page":"212-222","source":"Crossref","is-referenced-by-count":21,"title":["Assessing Direct Monitoring Techniques to Analyze Failures of Critical Industrial Systems"],"prefix":"10.1109","author":[{"given":"Marcello","family":"Cinque","sequence":"first","affiliation":[]},{"given":"Domenico","family":"Cotroneo","sequence":"additional","affiliation":[]},{"given":"Raffaele Della","family":"Corte","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Pecchia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2008.107"},{"key":"ref32","article-title":"A log mining approach to failure analysis of enterprise telephony systems","author":"lim","year":"0","journal-title":"Proc of the 2005 international Conference on Dependable Systems and Networks (DSN)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144598347035"},{"key":"ref30","first-page":"814","volume":"35","author":"enke","year":"1993","journal-title":"The Analysis of Contingency Tables"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/RTTAS.1997.601363"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"journal-title":"Mars Science Laboratory","year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2007.909758"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.17"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.1999.805094"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591172"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.87"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956799"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958210"},{"key":"ref28","article-title":"On Fault Representativeness of Software Fault Injection","author":"natella","year":"2011","journal-title":"IEEE Transactions on Software Engineering"},{"journal-title":"Technical Report","article-title":"Dod guide for achieving reliability, availability, and maintainability","year":"2005","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/32.177364"},{"journal-title":"Technical Report 3 Rue de Varemb\ufffd Case Postale 131 CH-1211 Gen\ufffdve 20","article-title":"The International Electrotechnical Commission. IEC 61508: Functional safety of electrical\/electronic\/programmable electronic safety-related systems - part 7","year":"1998","key":"ref3"},{"key":"ref6","article-title":"Runtime Reflection: Dynamic model-based analyis of component-based distributed embedded systems","author":"bauer","year":"2006","journal-title":"Modellierung Von Automotive Systems"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2012.24"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2514\/1.49356"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/S1571-0661(04)00247-6","article-title":"Jass - java with assertions","volume":"55","author":"bartetzko","year":"2001","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/ICDSN.2000.857510","article-title":"Executable assertions for detecting data errors in embedded control systems","author":"hiller","year":"2000","journal-title":"Dependable Systems and Networks 2000 DSN 2000 Proceedings International Conference on"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.91"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.67"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/2.386988"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.62"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/OLT.2003.1214380"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/32.341844"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/383845.383853","article-title":"Aspect-oriented programming: Introduction","volume":"44","author":"tzilla","year":"2001","journal-title":"Commun ACM"},{"key":"ref23","first-page":"2","article-title":"Dynamic instrumentation of production systems","author":"cantrill","year":"2004","journal-title":"Proceedings of the Annual Conference on USENIX Annual Technical Conference"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2010.5544279"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.113"}],"event":{"name":"2014 IEEE 25th International Symposium on Software Reliability Engineering (ISSRE)","start":{"date-parts":[[2014,11,3]]},"location":"Naples, Italy","end":{"date-parts":[[2014,11,6]]}},"container-title":["2014 IEEE 25th International Symposium on Software Reliability Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6982003\/6982338\/06982628.pdf?arnumber=6982628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T22:53:05Z","timestamp":1498171985000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6982628\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/issre.2014.30","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}