iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1007/978-3-319-45559-4_20
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T06:52:49Z","timestamp":1725864769348},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319455587"},{"type":"electronic","value":"9783319455594"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45559-4_20","type":"book-chapter","created":{"date-parts":[[2016,9,7]],"date-time":"2016-09-07T10:00:08Z","timestamp":1473242408000},"page":"190-200","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["D-S Theory for Argument Confidence Assessment"],"prefix":"10.1007","author":[{"given":"Rui","family":"Wang","sequence":"first","affiliation":[]},{"given":"J\u00e9r\u00e9mie","family":"Guiochet","sequence":"additional","affiliation":[]},{"given":"Gilles","family":"Motet","sequence":"additional","affiliation":[]},{"given":"Walter","family":"Sch\u00f6n","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,8]]},"reference":[{"key":"20_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-642-33678-2_26","volume-title":"Computer Safety, Reliability, and Security","author":"A Ayoub","year":"2012","unstructured":"Ayoub, A., Kim, B.G., Lee, I., Sokolsky, O.: A systematic approach to justifying sufficient confidence in software safety arguments. In: Ortmeier, F., Lipaczewski, M. (eds.) SAFECOMP 2012. LNCS, vol. 7612, pp. 305\u2013316. Springer, Heidelberg (2012)"},{"key":"20_CR2","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-1-4471-1534-2_14","volume-title":"Industrial Perspectives of Safety-Critical Systems","author":"P Bishop","year":"1998","unstructured":"Bishop, P., Bloomfield, R.: A methodology for safety case development. In: Redmill, F., Anderson, T. (eds.) Industrial Perspectives of Safety-Critical Systems, pp. 194\u2013203. Springer, Heidelberg (1998)"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Bloomfield, R., Littlewood, B., Wright, D.: Confidence: its role in dependability cases for risk assessment. In: 37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN 2007, pp. 338\u2013346. IEEE (2007)","DOI":"10.1109\/DSN.2007.29"},{"issue":"3","key":"20_CR4","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MSP.2006.73","volume":"4","author":"RE Bloomfield","year":"2006","unstructured":"Bloomfield, R.E., Guerra, S., Miller, A., Masera, M., Weinstock, C.B.: International working group on assurance cases (for security). IEEE Secur. Priv. 4(3), 66\u201368 (2006)","journal-title":"IEEE Secur. Priv."},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Cyra, L., Gorski, J.: Supporting compliance with security standards by trust case templates. In: 2nd International Conference on Dependability of Computer Systems, DepCoS-RELCOMEX 2007, pp. 91\u201398. IEEE (2007)","DOI":"10.1109\/DEPCOS-RELCOMEX.2007.44"},{"issue":"1","key":"20_CR6","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.ress.2010.06.027","volume":"96","author":"L Cyra","year":"2011","unstructured":"Cyra, L., Gorski, J.: Support for argument structures review and assessment. Reliab. Eng. Syst. Saf. 96(1), 26\u201337 (2011)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"20_CR7","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1214\/aoms\/1177699517","volume":"37","author":"AP Dempster","year":"1966","unstructured":"Dempster, A.P.: New methods for reasoning towards posterior distributions based on sample data. Ann. Math. Stat. 37, 355\u2013374 (1966)","journal-title":"Ann. Math. Stat."},{"key":"20_CR8","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1214\/aoms\/1177698950","volume":"38","author":"AP Dempster","year":"1967","unstructured":"Dempster, A.P.: Upper and lower probabilities induced by a multivalued mapping. Ann. Math. Stat. 38, 325\u2013339 (1967)","journal-title":"Ann. Math. Stat."},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Denney, E., Pai, G., Habli, I.: Towards measurement of confidence in safety cases. In: International Symposium on Empirical Software Engineering and Measurement (ESEM), pp. 380\u2013383. IEEE (2011)","DOI":"10.1109\/ESEM.2011.53"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Den\u0153ux, T.: The cautious rule of combination for belief functions and some extensions. In: 9th International Conference on Information Fusion, pp. 1\u20138. IEEE (2006)","DOI":"10.1109\/ICIF.2006.301572"},{"key":"20_CR11","unstructured":"DO-178C, ED-12C. Software considerations in airborne systems and equipment certification. RTCA\/EUROCAE (2011)"},{"volume-title":"A Practical Study of Argument","year":"2013","author":"T Govier","key":"20_CR12","unstructured":"Govier, T.: A Practical Study of Argument. Cengage Learning, Wadsworth (2013)"},{"key":"20_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-3-319-24255-2_23","volume-title":"Computer Safety, Reliability, and Security","author":"J Guiochet","year":"2015","unstructured":"Guiochet, J., Do Hoang, Q.A., Kaaniche, M.: A model for safety case confidence assessment. In: Koornneef, F., van Gulijk, C. (eds.) SAFECOMP 2015. LNCS, vol. 9337, pp. 313\u2013327. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-24255-2_23"},{"key":"20_CR14","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-0-85729-133-2_1","volume-title":"Advances in Systems Safety","author":"R Hawkins","year":"2011","unstructured":"Hawkins, R., Kelly, T., Knight, J., Graydon, P.: A new approach to creating clear safety arguments. In: Dale, C., Anderson, T. (eds.) Advances in Systems Safety, pp. 3\u201323. Springer, Heidelberg (2011)"},{"key":"20_CR15","unstructured":"ISO 26262. Software considerations in airborne systems and equipment certification. International Organization for Standardization (ISO) (2011)"},{"issue":"03","key":"20_CR16","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1142\/S0218488501000831","volume":"9","author":"A J\u00f8sang","year":"2001","unstructured":"J\u00f8sang, A.: A logic for uncertain probabilities. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. 9(03), 279\u2013311 (2001)","journal-title":"Int. J. Uncertainty Fuzziness Knowl.-Based Syst."},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Kelly, T.: Arguing safety - a systematic approach to safety case management. Ph.D. thesis, Department of Computer Science, University of York (1998)","DOI":"10.1007\/3-540-48249-0_2"},{"key":"20_CR18","first-page":"55","volume-title":"Computer Safety, Reliability, and Security (SAFECOMP)","author":"T Kelly","year":"1997","unstructured":"Kelly, T., McDermid, J.: Safety case construction and reuse using patterns. In: Daniel, P. (ed.) Computer Safety, Reliability, and Security (SAFECOMP), pp. 55\u201369. Springer, Heidelberg (1997)"},{"key":"20_CR19","unstructured":"Kelly, T., Weaver, R.: The goal structuring notation-a safety argument notation. In: Proceedings of the Dependable Systems and Networks (DSN) Workshop on Assurance Cases (2004)"},{"key":"20_CR20","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1007\/11518655_47","volume-title":"Symbolic and Quantitative Approaches to Reasoning with Uncertainty","author":"D Mercier","year":"2005","unstructured":"Mercier, D., Quost, B., Den\u0153ux, T.: Contextual discounting of belief functions. In: Godo, L. (ed.) ECSQARU 2005. LNCS (LNAI), vol. 3571, pp. 552\u2013562. Springer, Heidelberg (2005)"},{"key":"20_CR21","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","volume-title":"A Mathematical Theory of Evidence","author":"G Shafer","year":"1976","unstructured":"Shafer, G.: A Mathematical Theory of Evidence, vol. 1. Princeton University Press Princeton, Princeton (1976)"},{"key":"20_CR22","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511840005","volume-title":"The Uses of Argument","author":"SE Toulmin","year":"2003","unstructured":"Toulmin, S.E.: The Uses of Argument. Cambridge University Press, Cambridge (2003)"},{"key":"20_CR23","unstructured":"Robert Andrew Weaver: The safety of software: constructing and assuring arguments. Ph.D. thesis, Department of Computer Science, University of York (2003)"}],"container-title":["Lecture Notes in Computer Science","Belief Functions: Theory and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45559-4_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T21:28:44Z","timestamp":1657229324000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45559-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319455587","9783319455594"],"references-count":23,"URL":"http:\/\/dx.doi.org\/10.1007\/978-3-319-45559-4_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"8 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BELIEF","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Belief Functions","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Prague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Czech Republic","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"belief2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}