{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:20:40Z","timestamp":1766067640455,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031223365"},{"type":"electronic","value":"9783031223372"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-22337-2_4","type":"book-chapter","created":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T10:08:41Z","timestamp":1672222121000},"page":"61-84","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["An Architecture for Safe Driving Automation"],"prefix":"10.1007","author":[{"given":"Hermann","family":"Kopetz","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,29]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Avizienis, A., Laprie, J.C.: Dependable computing: from concepts to design diversity. Proc. IEEE 54(5), pp. 629\u2013638 (1986)","DOI":"10.1109\/PROC.1986.13527"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Bhattacharyya, S., Cofer, D.: Certification considerations for adaptive systems. NASA Report NASA\/CR-2015\u2013218702, March 2015","DOI":"10.1109\/ICUAS.2015.7152300"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Chou, A., et al.: An empirical study of operating system errors. In: Proceedings of the ACM SOPS 2001, pp. 73\u201388 (2001)","DOI":"10.1145\/502059.502042"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Constantinescu, C.: Impact of deep submicron technology on dependability of VLSI circuits. In: Proceedings International Conference on Dependable Systems and Networks, Washington, DC, USA, pp. 205\u2013209 (2002)","DOI":"10.1109\/DSN.2002.1028901"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-540-39878-3_19","volume-title":"Computer Safety, Reliability, and Security","author":"K Driscoll","year":"2003","unstructured":"Driscoll, K., Hall, B., Sivencrona, H., Zumsteg, P.: Byzantine fault tolerance, from theory to reality. In: Anderson, S., Felici, M., Littlewood, B. (eds.) SAFECOMP 2003. LNCS, vol. 2788, pp. 235\u2013248. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-39878-3_19"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Dvorak, D.L.: NASA study on flight software complexity. Jet Propulsion Laboratory, California Institute of Technology (2009)","DOI":"10.2514\/6.2009-1882"},{"key":"4_CR7","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1146\/annurev.psych.48.1.269","volume":"48","author":"HE Egerth","year":"1997","unstructured":"Egerth, H.E., Yantis, S.: Visual attention: control, representation and time course. Annu. Rev. Psychol. 48, 269\u2013297 (1997)","journal-title":"Annu. Rev. Psychol."},{"key":"4_CR8","doi-asserted-by":"publisher","unstructured":"Furrer, F.: Future-Proof Software Systems: A sustainable Evolution Strategy. Springer, Wiesbaden (2019). https:\/\/doi.org\/10.1007\/978-3-658-19938-8","DOI":"10.1007\/978-3-658-19938-8"},{"key":"4_CR9","unstructured":"Gray, J.: Why do computers fail and what can be done about it? Technical report 85\/7. Tandem Computer Corporation, June 1985"},{"key":"4_CR10","unstructured":"Herger, M.: Disengagement Report 2019. https:\/\/thelastdriverlicenseholder.com\/2020\/02\/26\/disengagement-report-2019\/. Accessed 22 Dec 2020"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Kalra, N., Paddock, S.M.: Driving to safety: how many miles of driving would it take to demonstrate autonomous vehicle reliability? Transp. Res. Part A Policy Pract. 94, 182\u2013193 (2016)","DOI":"10.1016\/j.tra.2016.09.010"},{"key":"4_CR12","doi-asserted-by":"publisher","unstructured":"Khraisat, A., et al.: Survey of intrusion detection systems: techniques, data sets, and challenges (2019). https:\/\/doi.org\/10.1186\/s42400-019-0038-7. Accessed 31 July 2020","DOI":"10.1186\/s42400-019-0038-7"},{"issue":"1","key":"4_CR13","first-page":"90","volume":"9","author":"P Koopman","year":"2017","unstructured":"Koopman, P.: Autonomous vehicle safety: an interdisciplinary challenge. IEEE Intell. Transp. Mag. 9(1), 90\u201396 (2017)","journal-title":"IEEE Intell. Transp. Mag."},{"key":"4_CR14","doi-asserted-by":"publisher","unstructured":"Kopetz, H.: On the fault hypothesis for a safety-critical real-time system. In: Broy, M., Kr\u00fcger, I.H., Meisinger, M. (eds.) ASWSD 2004. LNCS, vol. 4147. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11823063_3","DOI":"10.1007\/11823063_3"},{"key":"4_CR15","doi-asserted-by":"publisher","unstructured":"Kopetz, H., Real Time Systems\u2014Design Principles for Distributed Embedded Applications, 2nd edn. Springer, New York (2012). https:\/\/doi.org\/10.1007\/978-1-4419-8237-7","DOI":"10.1007\/978-1-4419-8237-7"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Kopetz, H., et al.: Direct versus stigmergic information flows in systems-of-systems. In: Proceedings of the 10th System of Systems Engineering Conference (SoSE), pp. 36\u201341. IEEE Press (2015)","DOI":"10.1109\/SYSOSE.2015.7151963"},{"key":"4_CR17","doi-asserted-by":"publisher","unstructured":"Kopetz, H., Bondavalli, A., Brancati, F., Fr\u00f6mel, B., H\u00f6ftberger, O., Iacob, S.: Emergence in cyber-physical systems-of-systems (CPSoSs). In: Bondavalli, A., Bouchenak, S., Kopetz, H. (eds.) Cyber-Physical Systems of Systems. LNCS, vol. 10099, pp. 73\u201396. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-47590-5_3","DOI":"10.1007\/978-3-319-47590-5_3"},{"key":"4_CR18","doi-asserted-by":"publisher","unstructured":"Kopetz, H.: Simplicity is Complex\u2014Foundations of Cyber-Physical System Design. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-20411-2","DOI":"10.1007\/978-3-030-20411-2"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Lala, J., Harper, R.: Architectural principles for safety-critical real-time applications. Proc. IEEE 82(1), 25\u201340 (1994)","DOI":"10.1109\/5.259424"},{"issue":"3","key":"4_CR20","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L Lamport","year":"1982","unstructured":"Lamport, L., et al.: The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382\u2013401 (1982)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Li, G., et al.: Understanding error propagation in deep learning neural networks (DNN) accelerators and applications. In: Proceedings\u00a0of the International Conference for High Performance Computing, Networking, Storage and Analysis, pp.1\u201312. ACM Press (2017)","DOI":"10.1145\/3126908.3126964"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Littlewood, B., Strigini, L.: Validation of ultrahigh dependability for software-based systems. Commun. ACM 36(11), 69\u201380 (1993)","DOI":"10.1145\/163359.163373"},{"key":"4_CR23","unstructured":"Mat19 et al. White Paper: Safety First for Driving Automation. https:\/\/www.daimler.com\/innovation\/case\/autonomous\/safety-first-for-automated-driving-2.html. Accessed 22 May 2020"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Mehmed, A., et al.: The monitor as a key architectural element for safe self-driving. In: Proceedings\u00a0of the DSN 2020, vol. DSN-S, Valencia, Spain. IEEE Press (2020)","DOI":"10.1109\/DSN-S50200.2020.00015"},{"key":"4_CR25","unstructured":"Mims, C.: Self-driving cars could be decades away, no matter what Elon Musk said. Wall Street J. (2021)"},{"key":"4_CR26","unstructured":"A Vision for Safety.https:\/\/www.nhtsa.gov\/automated-driving-systems\/voluntary-safety-self-assessment. Accessed 16 Dec 2020"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Pompili, M., et al.: Car accidents as a method of suicide: a comprehensive overview. Forensic Sci. Int. 223(1\u20133), 1\u20139 (2012)","DOI":"10.1016\/j.forsciint.2012.04.012"},{"key":"4_CR28","first-page":"1995","volume-title":"Predictably Dependable Computing Systems","author":"D Powell","year":"1995","unstructured":"Powell, D.: Failure mode assumptions and assumption coverage. In: Randell, B., Laprie, J.C., Kopetz, H., Littlewood, B. (eds.) Predictably Dependable Computing Systems, p. 1995. Springer Verlag, ESPRIT Basic Research Series (1995)"},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"Rasmussen, J.: Skills, rules and knowledge; signals, signs and symbols, and other distinctions in human performance models. IEEE Trans. Syst. Man Cybern. smc-13(3), 257\u2013266 (1983)","DOI":"10.1109\/TSMC.1983.6313160"},{"key":"4_CR30","unstructured":"SAE, Standard J3016. Surface Vehicle Recommended Practice. SAE International, 2018"},{"key":"4_CR31","unstructured":"Sha, S.A.: Save-AV, A fault-tolerant safety architecture for autonomous vehicles.https:\/\/macsphere.mcmaster.ca\/handle\/11375\/24205. Accessed 3 Feb 2021"},{"key":"4_CR32","unstructured":"Traffic Statistics in Austria 2018. https:\/\/www.statistik.at\/web_de\/statistiken\/energie_umwelt_innovation_mobilitaet\/verkehr\/strasse\/unfaelle_mit_personenschaden\/index.html. Accessed 26 May 2019"},{"key":"4_CR33","doi-asserted-by":"crossref","unstructured":"Yue, L., et al.: Assessment of the safety benefits of vehicles\u2019 advanced driver assistance, connectivity and low-level automation systems. Accid. Anal. Prev. 117, 55\u201364 (2018)","DOI":"10.1016\/j.aap.2018.04.002"}],"container-title":["Lecture Notes in Computer Science","Principles of Systems Design"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-22337-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,11]],"date-time":"2024-10-11T02:54:31Z","timestamp":1728615271000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-22337-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031223365","9783031223372"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-22337-2_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"29 December 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}