Abstract
A German project is presented which was initiated in order to analyse the potential and risks associated with Cyber-Physical Systems. These have been recognised as the next wave of innovation in information and communication technology. Cyber-Physical Systems are herein understood in a very broad sense as the integration of embedded systems with global networks such as the Internet. The survey aims at deepening understanding the impact of those systems at technological and economical level as well as at political and sociological level. The goal of the study is to collect arguments for decision makers both in business and politics to take actions in research, legislation and business development.
This work has been partially sponsored by the BMBF project “Integrierte Forschungsagenda Cyber-Physical Systems” under the patronage of acatech, the National Academy of Science and Engineering.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Achatz, R., Beetz, K., Broy, M., Dämbkes, H., Damm, W., Grimm, K., Liggesmeyer, P.: Nationale Roadmap Embedded Systems. ZVEI (Zentralverband Elektrotechnik und Elektronikindustrie e. V.), Kompetenzzentrum Embedded Software & Systems, Frankfurt/Main (December 2009), https://www.zvei.org/fileadmin/user_upload/Forschung_Bildung/NRMES.pdf
Anderson, R., Bond, M., Clulow, J., Skorobogatov, S.: Cryptographic processors – a survey. Technical Report UCAM-CL-TR-641, University of Cambridge, Computer Laboratory (August 2005), http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-641.pdf
Armenio, F., Barthel, H., Dietrich, P., Duker, J., Floerkemeier, C., Garrett, J., Harrison, M., Hogan, B., Mitsugi, J., Preishuber-Pfluegl, J., Ryaboy, O., Sarma, S., Suen, K.K., Williams, J.: The EPCglobal Architecture Framework. In: Traub, K. (ed.) Technical report, GS1 (2010) (final version 1.4 approved December 15, 2010), http://www.gs1.org/gsmp/kc/epcglobal/architecture/architecture_1_4-framework-20101215.pdf
Avižienis, A., Laprie, J.-C., Randell, B., Landwehr, C.: Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Transactions on Dependable and Secure Computing 1(1), 11–33 (2004)
Arbeitskreis Multicore. Relevanz eines Multicore-Ökosystems für künftige Embedded Systems: Positionspapier zur Bedeutung, Bestandsaufnahme und Potentialermittlung der Multicore-Technologie für den Industrie- und Forschungsstandort Deutschland (December 2011), http://www.bicc-net.de/workspace/uploads/subfeatures/downloads/positionspapier_multicore_oekosys-1323952449.pdf
AUTOSAR – Demonstration of Integration of AUTOSAR into a MM/T/HMI ECU V1.0.0. Technical report, AUTOSAR (AUTomotive Open System ARchitecture) (2010), http://www.autosar.org/download/informaldocuments/AUTOSAR_TR_IntegrationintoMMTHMIECU.pdf
Aziz, R.A., Zowghi, D., McBride, T.: Towards a Classification of Requirements Relationships. In: 21st International Conference on Software Engineering & Knowledge Engineering (SEKE 2009, Proceedings), pp. 26–32. Knowledge Systems Institute Graduate School (2009)
Baumgart, A., Böde, E., Büker, M., Damm, W., Ehmen, G., Gezgin, T., Henkler, S., Hungar, H., Josko, B., Oertel, M., Peikenkamp, T., Reinkemeier, P., Stierand, I., Weber, R.: Architecture modeling. Technical report, Oldenburger Forschungs- und Entwicklungsinstitut für Informatik (OFFIS) (March 2011)
Bernon, C., Chevrier, V., Hilaire, V., Marrow, P.: Applications of self-organising multi-agent systems: An initial framework for comparison. Informatica 30(1), 73–82 (2006)
Berger, T.: Softwareproduktlinien-Entwicklung – Domain Engineering: Konzepte, Probleme und Lösungsansätze. Diplomarbeit, Universität Leipzig (April 2007)
Broy, M., Geisberger, E., Cengarle, M.V., Keil, P., Niehaus, J., Thiel, C., Thönnißen-Fries, H.-J.: Cyber-Physical Systems: Innovationsmotor für Mobilität, Gesundheit, Energie und Produktion. acatech BEZIEHT POSITION, vol. 8. Springer, Berlin (2012), http://www.springer.com/computer/book/978-3-642-27566-1
Broy, M., Geisberger, E., Kazmeier, J., Rudorfer, A., Beetz, K.: Ein Requirements-Engineering-Referenzmodell. Informatik Spektrum 30(3), 127–142 (2007)
Brand, L., Hülser, T., Grimm, V., Zweck, A.: Internet der Dinge: ”Ubersichtsstudie. Technical report, Zukünftige Technologien Consulting der VDI Technologiezentrum GmbH (March 2009), http://www.vdi.de/fileadmin/vdi_de/redakteur/dps_bilder/TZ/2009/Band%2080_IdD_komplett.pdf
Bishop, C.: Pattern Recognition and Machine Learning. Springer, New York (2007), Corr. 2nd printing
Brecher, C., Kozielski, S., Schapp, L.: Integrative Produktionstechnik für Hochlohnländer, pp. 47–70. Springer, Berlin (2011), http://www.acatech.de/fileadmin/user_upload/Baumstruktur_nach_Website/Acatech/root/de/Publikationen/acatech_diskutiert/acatech_diskutiert_Wertschoepfung_WEB.pdf
Brands, S. (ed.): Rethinking Public Key Infrastructures and Digital Certificates; Building in Privacy. MIT Press, Cambridge (2000)
Bussmann, S., Schild, K.: Self-Organizing Manufacturing Control: An Industrial Application of Agent Technology. In: Fourth International Conference on Multi Agent Systems (Proceedings), pp. 87–94 (2000)
Leitfaden Informationssicherheit – IT-Grundschutz kompakt. Technical Report BSI-Bro10/311, Referat 114 Sicherheitsmanagement und IT-Grundschutz, Bundesamt für Sicherheit in der Informationstechnik (2010), https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Grundschutz/Leitfaden/GS-Leitfaden_pdf.pdf?__blob=publicationFile
Cavoukian, A.: Privacy by Design. Technical report, Office of the Information and Privacy Commissioner, Ontario (2009), http://www.privacybydesign.ca/content/uploads/2010/03/PrivacybyDesignBook.pdf
Definition and exemplification of RSL and RMM. Deliverable D_SP2_R2.1_M1, Cost-efficient methods and processes for safety relevant embedded systems (CESAR) (April 2010), http://www.cesarproject.eu/fileadmin/user_upload/CESAR_D_SP2_R2.1_M1_v1.000.pdf
Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T.: Comprehensive Experimental Analyses of Automotive Attack Surfaces. In: 20th USENIX Security Symposium (Proceedings), pp. 77–92 (2011), http://www.autosec.org/pubs/cars-usenixsec2011.pdf
Mont, M.C., Pearson, S., Bramhall, P.: Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services. In: 14th International Workshop on Database and Expert Systems Applications (DEXA 2003, Proceedings), pp. 377–382. IEEE Computer Society (September 2003), Long version http://www.hpl.hp.com/techreports/2003/HPL-2003-49.pdf
Cusumano, M., Nobeoka, K.: Thinking Beyond Lean: how multi-project management is transforming product development at Toyota and other companies. In: MIT International Motor Vehicle Program. Free Press (May 2008)
Cyber-Physical Systems Summit “Holistic Approaches to Cyber-Physical Integration”. Report, CPS Week (April 2008), http://iccps2012.cse.wustl.edu/_doc/CPS_Summit_Report.pdf
Capurro, R., Scheule, R., Hausmanninger, T. (eds.): Vernetzt gespalten: Der Digital Divide in ethischer Perspektive. Wilhelm Fink, Paderborn (2004)
Cusumano, M.: Staying Power: Six Enduring Principles for Managing Strategy and Innovation in an Uncertain World. Oxford University Press, Oxford (2010)
Christaller, T., Wehner, J. (eds.): Autonome Maschinen. Westdeutscher Verlag, Wiesbaden (2003)
Cramer, S., Weyer, J.: Interaktion, Risiko und Governance in hybriden Systemen. In: Dolata, Werle [DW07], pp. 267–286, http://www.techniksoziologie-dortmund.de/Mitarbeiter/Cramer/K%C3%B6lnpdf.pdf
Dmitriev, S.: Language Oriented Programming: The Next Programming Paradigm. onBoard (November 1, 2004), http://www.jetbrains.com/mps/docs/Language_Oriented_Programming.pdf
Department of Defense Architecture Framework Version 2.0 (DoDAF V2.0) – Volume 1: Introduction, Overview, and Concepts – Manager’s Guide. Technical report, Department of Defense Chief Information Officer (May 2009), http://cio-nii.defense.gov/docs/DoDAF%20V2%20-%20Volume%201.pdf
Department of Defense Architecture Framework Version 2.0 (DoDAF V2.0) – Volume 2: Architectural Data and Models – Architect’s Guide. Technical report, Department of Defense Chief Information Officer (May 2009), http://cio-nii.defense.gov/docs/DoDAF%20V2%20-%20Volume%202.pdf
Department of Defense Architecture Framework Version 2.0 (DoDAF V2.0) – Volume 3: DoDAF Meta-model, Physical Exchange Specification – Developer’s Guide. Technical report, Department of Defense Chief Information Officer (May 2009), http://cio-nii.defense.gov/docs/DoDAF%20V2%20-%20Volume%203.pdf
Drath, R. (ed.): Datenaustausch in der Anlagenplanung mit AutomationML: Integration von CAEX, PLCopen XML und COLLADA. VDI-Buch. Springer, Heidelberg (2010)
Dolata, U., Werle, R. (eds.): Gesellschaft und die Macht der Technik: Sozioökonomischer und institutioneller Wandel durch Technisierung. Schriften aus dem Max-Planck-Institut für Gesellschaftsforschung Köln, vol. 58. Campus Verlag, Frankfurt (2007)
Endsley, M., Bolte, B., Jones, D.: Designing for Situation Awareness: An Approach to User-Centered Design. CRC Press (July 2003)
European Convention on Human Rights (Convention for the Protection of Human Rights and Fundamental Freedoms. Article 8 “Right to respect for private and family life” (as amended by the provisions of Protocol No. 14 (CETS no. 194) as from its entry into force on June 1, 2010 (November 4, 1950), http://www.echr.coe.int/NR/rdonlyres/D5CC24A7-DC13-4318-B457-5C9014916D7A/0/CONVENTION_ENG_WEB.pdf
European Community. Directive 95/49/DC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities L 281, 31–50 (1995), http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:1995:281:0031:0050:EN:PDF
European Community. Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications). Official Journal of the European Communities L 201, 37–47 (2002), http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2002:201:0037:0047:EN:PDF
European Union. Directive 2009/136/EC of the European Parliament and of the Council of 25 November 2009 amending Directive 2002/22/EC on universal service and users’ rights relating to electronic communications networks and services, Directive 2002/58/EC concerning the processing of personal data and the protection of privacy in the electronic communications sector and Regulation (EC) No 2006/2004 on cooperation […] for the enforcement of consumer protection laws. Official Journal of the European Union L 337, 11–36 (2009), http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2009:337:0011:0036:EN:PDF
Fischer, K., Florian, M., Malsch, T. (eds.): Socionics. LNCS (LNAI), vol. 3413. Springer, Heidelberg (2005)
Fischer-Hübner, S., Duquenoy, P., Hansen, M., Leenes, R., Zhang, G. (eds.): Privacy and Identity Management for Life. IFIP AICT, vol. 352. Springer, Heidelberg (2011)
Fikes, R., Nilsson, N.: STRIPS: A new approach to the application of theorem proving to problem solving. Artificial Intelligence 2(3-4), 189–208 (1971)
Garvin, D.: What does “product quality” really mean? MIT Sloan Management Review, 25–45 (1984)
Geisberger, E., Broy, M., Berenbach, B., Kazmeier, J., Paulish, D., Rudorfer, A.: Requirements Engineering Reference Model (REM). Technical Report TUM-I0618, Technische Universität München (November 2006)
Geisberger, E., Broy, M., Cengarle, M.V., Keil, P., Niehaus, J., Thiel, C., Thönnißen-Fries, H.-J.: agendaCPS: Integrierte Forschungsagenda Cyber-Physical Systems. Springer, Berlin (2012), http://www.fortiss.org/fileadmin/user_upload/downloads/agendaCPS_Studie.pdf
Gifford, C. (ed.): The Hitchhiker’s Guide to Manufacturing Operations Management: ISA-95 Best Practices Book 1.0. ISA (2007)
Roadmap “Prozess-Sensoren 2015+”. Technical report, NAMUR und VDI/VDE-Gesellschaft Mess- und Automatisierungstechnik (GMA) (November 2009), http://www.vdi.de/fileadmin/vdi_de/redakteur_dateien/gma_dateien/Prozess-Sensoren_2015+.pdf
Geib, C., Mourão, K., Petrick, R., Pugeault, N., Steedman, M., Krueger, N., Wörgötter, F.: Object Action Complexes as an Interface for Planning and Robot Control. In: Humanoids 2006 Workshop Towards Cognitive Humanoid Robots, Proceedings (2006)
Garside, R., Pighetti, J.: Integrating modular avionics: A new role emerges. Aerospace and Electronic Systems Magazine (IEEE) 24(3), 31–34 (2009)
Geisberger, E., Schätz, B.: Modellbasierte Anforderungsanalyse mit AutoRAID. Informatik – Forschung und Entwicklung 21(3-4), 231–242 (2007)
Hirvonen, J., Sallinen, M., Maula, H., Suojanen, M.: Sensor Networks Roadmap. Research notes 2381, VTT Tiedotteita (2007), http://www.vtt.fi/inf/pdf/tiedotteet/2007/T2381.pdf
Hansen, M., Thiel, C.: Cyber-Physical Systems und Privatsphären-Schutz. Datenschutz und Datensicherheit (DuD) 36(1) (2012)
Huang, J.-D.: Kinerehab: a kinect-based system for physical rehabilitation: a pilot study for young adults with motor disabilities. In: 13th International ACM SIGACCESS Conference on Computers and Accessibility (ASSETS 2011, Proceedings), pp. 319–320 (2011)
Hogg, S., Vyncke, E.: IPv6 Security: Information assurance for the next-generation Internet Protocol. Cisco Press, Indianapolis (2008)
Heuser, L., Wahlster, W. (eds.): Internet der Dienste. acatech DISKUTIERT. Springer, Berlin (2011), http://www.acatech.de/fileadmin/user_upload/Baumstruktur_nach_Website/Acatech/root/de/Publikationen/acatech_diskutiert/acatech_Diskutiert_Internet-der-Dienste_WEB_02.pdf
Functional safety of electrical/electronic/programmable electronic safety-related systems. Technical Report IEC/TR 61508 Part 0-7, International Electrotechnical Commission (IEC) (2010)
Road vehicles – Functional safety – Part 1: Vocabulary. Technical Report ISO 26262-1:2011, International Organization for Standardization (ISO) (November 2011), http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=43464
Joordens, M., Shaneyfelt, T., Eega, S., Jaimes, A., Jamshidi, M.: Applications and prototype for system of systems swarm robotics. In: Systems, Man and Cybernetics, 2008 (SMC 2008, Proceedings) (2008)
Kleinknecht, A.: Are there Schumpeterian waves of innovations? Cambridge Journal of Economics 14(1), 81–92 (1990)
Krewitt, W., Nienhaus, K., Roloff, N., Weeber, R., Reeg, M., Weimer-Jehle, W., Wassermann, S., Fuchs, G., Kast, T., Schmidt, B., Leprich, U., Hauser, E.: Analyse von Rahmenbedingungen für die Integration erneuerbarer Energien in die Strommärkte auf der Basis agentenbasierter Simulation (Abschlussbericht). Technical report, Deutsches Zentrum für Luft- und Raumfahrt e.V. (DLR), Interdisziplinärer Forschungsschwerpunkt Risiko und nachhaltige Technikentwicklung (ZIRN), Thomas Kast Simulation Solutions, Institut für ZukunftsEnergieSysteme (IZES), gefördert mit Mitteln des Bundesministeriums für Umwelt, Naturschutz und Reaktorsicherheit unter dem Förderkennzeichen 0325015 (February 2011), http://www.dlr.de/Portaldata/41/Resources/dokumente/st/AMIRIS-Pilotvorhaben.pdf
Koukoumidis, E., Peh, L.-S., Martonosi, M.: SignalGuru: leveraging mobile phones for collaborative traffic signal schedule advisory, pp. 127–140. ACM (2011)
Kotonya, G., Sommerville, I.: Requirements Engineering: Processes and Techniques. Wiley (September 1998)
Kalfoglou, Y., Schorlemmer, M.: Ontology mapping: The state of the art. The Knowledge Engineering Review 18(1), 1–31 (2003)
Könings, B., Schaub, F., Weber, M., Kargl, F.: Towards territorial privacy in smart environments. In: Genesereth, M., Vogl, R., Williams, M.-A. (eds.) Intelligent Information Privacy Management Symposium (AAAI Spring Symposium, Proceedings), pp. 113–118, Technical Report SS-10-05. Stanford University (March 2010), http://www.aaai.org/ocs/index.php/SSS/SSS10/paper/view/1043/1496
Latour, B.: Science in Action: How to Follow Scientists and Engineers through Society? Open University Press (1987)
Lenat, D.: From 2001 to 2001: Common Sense and the Mind of HAL, pp. 305–332. MIT Press, Cambridge (1997)
Leveson, N.: Safeware: System Safety and Computers. Addison-Wesley (September 1995)
Li, Y., Li, J., Yang, Y., Li, M.: Requirement-Centric Traceability for Change Impact Analysis: A Case Study. In: Wang, Q., Pfahl, D., Raffo, D.M. (eds.) ICSP 2008. LNCS, vol. 5007, pp. 100–111. Springer, Heidelberg (2008)
Leveson, N., Denise Pinnel, L., Sandys, S.D., Koga, S., Reese, J.D.: Analyzing Software Specifications for Mode Confusion Potential. In: Workshop on Human Error and System Development (Proceedings), pp. 132–146 (March 1997), http://sunnyday.mit.edu/papers/glascow.pdf
Marchetti, C.: Society as a Learning System: Discovery, Invention, and Innovation Cycles Revisited. Technological Forecasting and Social Change 18(4), 267–282 (1980)
Mattern, F. (ed.): Total vernetzt: Szenarien einer informatisierten Welt (7. Berliner Kolloquium der Gottlieb Daimler- und Karl Benz-Stiftung, Tagungsband). Xpert Press, Springer, Heidelberg (2003)
International Workshop on Multiple Classifier Systems (MCS, Proceedings). LNCS. Springer (2000-2011)
Mahnke, W., Leitner, S.-H., Damm, M.: OPC Unified Architecture. Springer (2010)
Marrón, P.J., Minder, D. (eds.): Embedded WiSeNts Research Roadmap. Logos Verlag, Berlin (2006), ftp://ftp.informatik.uni-stuttgart.de/pub/library/ncstrl.ustuttgart_fi/BOOK-2006-03/BOOK-2006-03.pdf
Pilot gaze performance in critical flight phases and during taxiing. Technical report, Deutsches Zentrum für Luft- und Raumfahrt (DLR), Results from the Project MOSES (More Operational Flight Security through increased Situation Awareness) (July 2008), http://www.dlr.de/fl/en/Portaldata/14/Resources/dokumente/abt27/MOSES_results.pdf
Monostori, L., Váncza, J., Kumara, S.R.T.: Agent-Based Systems for Manufacturing. CIRP Annals - Manufacturing Technology 55(2), 697–720 (2006)
NATO Architecture Framework Version 3.0 (NAF V2.0). Technical report, North Atlantic Treaty Organization (NATO) (November 2007), http://www.nhqc3s.nato.int/ARCHITECTURE/_docs/NAF_v3/ANNEX1.pdf
Norman, D.: Dinge des Alltags: Gutes Design und Psychologie für Gebrauchsgegenstände. Campus Verlag (March 1996)
Osborne, M.: An Introduction to Game Theory. Oxford University Press (August 2003)
Petrick, R.P.A., Bacchus, F.: Reasoning with Conditional Plans in the Presence of Incomplete Knowledge. In: ICAPS 2003 Workshop on Planning under Uncertainty and Incomplete Information’ (Proceedings), Trento, pp. 96–102. Università di Trento (June 2003)
Pohl, K., Böckle, G., van der Linden, F.: Software Product Line Engineering: Foundations, Principles and Techniques. Springer (August 2005)
Pohl, K., Böckle, G., van der Linden, F.: Software Product Line Engineering: Foundations, Principles and Techniques. Springer (2005)
Rabaey, J.: A brand new wireless day, p. 1. IEEE Computer Society Press, Los Alamitos (2008)
Rammert, W.: Technik in Aktion: Verteiltes Handeln in soziotechnischen Konstellationen. In: Christaller, Wehner [CW03], pp. 289–315
Rost, M., Bock, K.: Privacy By Design und die Neuen Schutzziele. Datenschutz und Datensicherheit (DuD) 35(1), 30–35 (2011)
Roussopoulos, M., Beslay, L., Bowden, C., Finocchiaro, G., Hansen, M., Langheinrich, M., Le Grand, G., Tsakona, K.: Technology-induced challenges in Privacy & Data Protection in Europe. Technical report, Ad Hoc Working Group on Privacy & Technology, European Network and Information Security Agency (ENISA) (October 2008), http://www.enisa.europa.eu/act/rm/files/deliverables/technology-induced-challenges-in-privacy-data-protection-in-europe/at_download/fullReport
Rubin, D., Lewis, S., Mungall, C., Misra, S., Westerfield, M., Ashburner, M., Sim, I., Chute, C., Solbrig, H., Storey, M.-A., Smith, B., Day-Richter, J., Noy, N., Musen, M.: National Center for Biomedical Ontology: Advancing Biomedicine through Structured Organization of Scientific Knowledge. OMICS: A Journal of Integrative Biology 10(2), 185–198 (2006), http://www.liebertonline.com/doi/pdf/10.1089/omi.2006.10.185
Russell, S., Norvig, P.: Artificial Intelligence: A Modern Approach, 3rd edn. Prentice Hall (December 2009)
Rost, M., Pfitzmann, A.: Datenschutz-Schutzziele – revisited. Datenschutz und Datensicherheit (DuD) 33(6), 353–358 (2009)
Rammert, W., Schulz-Schaeffer, I. (eds.): Können Maschinen handeln?: Soziologische Beiträge zum Verhältnis von Mensch und Technik. Campus Wissenschaft, Frankfurt/Main (2002)
Rammert, W., Schulz-Schaeffer, I.: Technik und Handeln – Wenn soziales Handeln sich auf menschliches Verhalten und technische Abläufe verteilt. In: Rammert, W., Schulz-Schaefer, I. [RSS02a], pp. 11–64
Sadri, F.: Logic-Based Approaches to Intention Recognition. In: Chong, N.-Y., Mastrogiovanni, F. (eds.) Handbook of Research on Ambient Intelligence and Smart Environments: Trends and Perspectives, pp. 346–375. IGI Global (May 2011)
Stankovic, J., Abdelzaher, T., Lu, C., Sha, L., Hou, J.: Real-time communication and coordination in embedded sensor networks. Proceedings of the IEEE Real-Time Systems 91(7), 1002–1022 (2003)
Sundermeyer, K., Bussmann, S.: Einführung der Agententechnologie in einem produzierenden Unternehmen – Ein Erfahrungsbericht. Wirtschaftsinformatik 43(2), 135–142 (2001)
Sage, A., Cuppan, C.: On the Systems Engineering and Management of Systems of Systems and Federations of Systems. Information-Knowledge-Systems Management 2(4), 325–345 (2001)
Schätz, B.: AutoFocus – Mastering the Complexity. In: Kordon, F., Lemoine, M. (eds.) Formal Methods for Embedded Distributed Systems: How to Master the Complexity, ch. 7, pp. 215–257. Kluwer Academic Publishers (2004)
Schaar, P.: Das Ende der Privatsphäre: Der Weg in die ”Uberwachungsgesellschaft. C. Bertelsmann (September 2007)
Schulz, A.: Driving without awareness – Folgen herabgesetzter Aufmerksamkeit im Stras̈enverkehr. VDM Verlag Dr. Müller (2007)
Schwan, B.: Grüne Welle dank Smartphone. Technical report, Technology Review (Oktober 7, 2011), http://www.heise.de/tr/artikel/Gruene-Welle-dank-Smartphone-1353408.html
Šmihula, D.: Waves of technological innovations and the end of the information revolution. Journal of Economics and International Finance 2(4), 58–67 (2010)
Schleipen, M., Münnemann, A., Sauer, O.: Interoperabilität von Manufacturing Execution Systems (MES): Durchgängige Kommunikation in unterschiedlichen Dimensionen der Informationstechnik in produzierenden Unternehmen. Automatisierungstechnik 59(7), 413–425 (2011), http://www.iosb.fraunhofer.de/servlet/is/4893/auto.2011.0936.pdf?command=downloadContent&filename=auto.2011.0936.pdf
Special section: Socionics. Journal of Artificial Societies and Social Simulation (January 2007), http://jasss.soc.surrey.ac.uk/10/1/contents.html
Stone, E., Skubic, M.: Evaluation of an Inexpensive Depth Camera for Passive In-Home Fall Risk Assessment. In: 5th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth 2011, Proceedings), pp. 71–77 (2011) (Best Paper Award), http://eldertech.missouri.edu/files/Papers/StoneE/Evaluation%20of%20an%20Inexpensive%20Depth%20Camera.pdf
Silverberg, G., Verspagen, B.: Breaking the waves: a Poisson regression approach to Schumpeterian clustering of basic innovations. Cambridge Journal of Economics 27(5), 671–693 (2003)
Thiel, C.: Multiple classifier systems incorporating uncertainty. Verlag Dr. Hut, München (2010)
TOGAF Version 9, Enterprise Edition. Technical report, The Open Group (February 2009), https://www2.opengroup.org/ogsys/jsp/publications/PublicationDetails.jsp?catalogno=g091
Webb, A.: Statistical Pattern Recognition, 2nd edn. John Wiley & Sons (October 2002)
Weiss, G. (ed.): Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence. MIT Press (July 2000)
Westin, A.F.: Privacy and Freedom, 1st edn. Atheneum, New York (1967)
Weyer, J.: Die Zukunft des Autos – das Auto der Zukunft. Wird der Computer den Menschen ersetzen? Soziologische Arbeitspapiere 14, Universität Dortmund (March 2006), http://www.wiso.tu-dortmund.de/wiso/is/Medienpool/Arbeitspapiere/ap-soz14.pdf
Wiedersheim, B., Ma, Z., Kargl, F., Papadimitratos, P.: Privacy in Inter-Vehicular Networks: Why simple pseudonym change is not enough. In: 7th International Conference on Wireless On-demand Network Systems and Services (WONS 2010, Proceedings), pp. 176–183. IEEE Computer Society Press (2010)
Wooldridge, M.: An Introduction to Multi Agent Systems, 2nd edn. John Wiley & Sons (May 2009)
Wood, A., Stankovic, J.: Security of Distributed, Ubiquitous, and Embedded Computing Platforms. In: Voeller, J. (ed.) Wiley Handbook of Science and Technology for Homeland Security, John Wiley & Sons (March 2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Broy, M., Cengarle, M.V., Geisberger, E. (2012). Cyber-Physical Systems: Imminent Challenges. In: Calinescu, R., Garlan, D. (eds) Large-Scale Complex IT Systems. Development, Operation and Management. Monterey Workshop 2012. Lecture Notes in Computer Science, vol 7539. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34059-8_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-34059-8_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34058-1
Online ISBN: 978-3-642-34059-8
eBook Packages: Computer ScienceComputer Science (R0)