{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T16:00:15Z","timestamp":1726070415474},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030430238"},{"type":"electronic","value":"9783030430245"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-43024-5_15","type":"book-chapter","created":{"date-parts":[[2020,3,9]],"date-time":"2020-03-09T00:02:15Z","timestamp":1583712135000},"page":"242-258","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Tool for Requirements Analysis of Safety-Critical Cyber-Physical Systems"],"prefix":"10.1007","author":[{"given":"Freek","family":"van den Berg","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Boudewijn R.","family":"Haverkort","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,3,9]]},"reference":[{"key":"15_CR1","unstructured":"Lee, E.A.: Cyber-physical systems-are computing foundations adequate. In: Position Paper for NSF Workshop On Cyber-Physical Systems: Research Motivation, Techniques and Roadmap, vol. 2 (2006)"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Rajkumar, R.R., Lee, I., Sha, L., Stankovic, J.: Cyber-physical systems: the next computing revolution. In: Proceedings of the 47th Design Automation Conference, pp. 731\u2013736. ACM (2010)","DOI":"10.1145\/1837274.1837461"},{"issue":"2","key":"15_CR3","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1109\/JSYST.2014.2322503","volume":"9","author":"SK Khaitan","year":"2015","unstructured":"Khaitan, S.K., McCalley, J.D.: Design techniques and applications of cyberphysical systems: a survey. IEEE Syst. J. 9(2), 350\u2013365 (2015)","journal-title":"IEEE Syst. J."},{"issue":"1","key":"15_CR4","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1109\/JPROC.2011.2165689","volume":"100","author":"A Banerjee","year":"2012","unstructured":"Banerjee, A., Venkatasubramanian, K.K., Mukherjee, T., Gupta, S.K.: Ensuring safety, security, and sustainability of mission-critical cyber-physical systems. Proc. IEEE 100(1), 283\u2013299 (2012)","journal-title":"Proc. IEEE"},{"issue":"4","key":"15_CR5","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/332051.332078","volume":"43","author":"J Bowen","year":"2000","unstructured":"Bowen, J.: The ethics of safety-critical systems. Commun. ACM 43(4), 91\u201397 (2000)","journal-title":"Commun. ACM"},{"key":"15_CR6","volume-title":"Requirements Engineering: Processes and Techniques","author":"G Kotonya","year":"1998","unstructured":"Kotonya, G., Sommerville, I.: Requirements Engineering: Processes and Techniques. Wiley Publishing, Hoboken (1998)"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/3-540-56777-1_15","volume-title":"Advanced Information Systems Engineering","author":"K Pohl","year":"1993","unstructured":"Pohl, K.: The three dimensions of requirements engineering. In: Rolland, C., Bodart, F., Cauvet, C. (eds.) CAiSE 1993. LNCS, vol. 685, pp. 275\u2013292. Springer, Heidelberg (1993). \nhttps:\/\/doi.org\/10.1007\/3-540-56777-1_15"},{"key":"15_CR8","volume-title":"UML Distilled: A Brief Guide to the Standard Object Modeling Language","author":"M Fowler","year":"2004","unstructured":"Fowler, M.: UML Distilled: A Brief Guide to the Standard Object Modeling Language. Addison-Wesley Professional, Boston (2004)"},{"key":"15_CR9","volume-title":"Patterns for Effective Use Cases","author":"S Adolph","year":"2002","unstructured":"Adolph, S., Cockburn, A., Bramble, P.: Patterns for Effective Use Cases. Addison-Wesley Longman Publishing Co., Inc., Boston (2002)"},{"key":"15_CR10","unstructured":"van den Berg, F., Remke, A., Haverkort, B.R.: A domain specific language for performance evaluation of medical imaging systems. In: 5th Workshop on Medical Cyber-Physical Systems, Service OpenAccess Series in Informatics, vol. 36, pp. 80\u201393. Schloss Dagstuhl (2014)"},{"key":"15_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-319-68270-9_11","volume-title":"ModelEd, TestEd, TrustEd","author":"F Berg van den","year":"2017","unstructured":"van den Berg, F., Haverkort, B.R., Hooman, J.: iDSL: automated performance evaluation of service-oriented systems. In: Katoen, J.-P., Langerak, R., Rensink, A. (eds.) ModelEd, TestEd, TrustEd. LNCS, vol. 10500, pp. 214\u2013236. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-68270-9_11"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-319-23267-6_15","volume-title":"Computer Performance Engineering","author":"F Berg van den","year":"2015","unstructured":"van den Berg, F., Remke, A., Haverkort, B.R.: iDSL: automated performance prediction and analysis of medical imaging systems. In: Beltr\u00e1n, M., Knottenbelt, W., Bradley, J. (eds.) EPEW 2015. LNCS, vol. 9272, pp. 227\u2013242. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-23267-6_15"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"van den Berg, F., Garousi, V., Tekinerdogan, B., Haverkort, B.R.: Designing cyber-physical systems with aDSL: a domain-specific language and tool support. In: 13th System of Systems Engineering Conference. IEEE (2018)","DOI":"10.1109\/SYSOSE.2018.8428770"},{"key":"15_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-7970-4","volume-title":"Entropy and Information Theory","author":"R Gray","year":"2011","unstructured":"Gray, R.: Entropy and Information Theory. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-1-4419-7970-4"},{"key":"15_CR15","unstructured":"Niwattanakul, S., Singthongchai, J., Naenudorn, E., Wanapu, S.: Using of Jaccard coefficient for keywords similarity. In: Proceedings of the International MultiConference of Engineers and Computer Scientists, vol. 1, no. 6 (2013)"}],"container-title":["Lecture Notes in Computer Science","Measurement, Modelling and Evaluation of Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-43024-5_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,9]],"date-time":"2020-03-09T00:05:16Z","timestamp":1583712316000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-43024-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030430238","9783030430245"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-43024-5_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"9 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MMB","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Measurement, Modelling and Evaluation of Computing Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saarbr\u00fccken","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 March 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 March 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mmb2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.mmb2020.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.375","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.27","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}