{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T04:08:15Z","timestamp":1746245295561,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":100,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642541179"},{"type":"electronic","value":"9783642541186"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54118-6_12","type":"book-chapter","created":{"date-parts":[[2014,4,23]],"date-time":"2014-04-23T05:47:39Z","timestamp":1398232059000},"page":"263-271","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Deploying Co-modelling in Commercial Practice"],"prefix":"10.1007","author":[{"given":"Sune","family":"Wolff","sequence":"first","affiliation":[]},{"given":"Peter Gorm","family":"Larsen","sequence":"additional","affiliation":[]},{"given":"Marcel","family":"Verhoef","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,17]]},"reference":[{"key":"12_CR1","volume-title":"A pattern language: towns, buildings, construction","author":"C Alexander","year":"1977","unstructured":"Alexander C, Ishikawa S, Silverstein M (1977) A pattern language: towns, buildings, construction. Oxford University Press, New York"},{"key":"12_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/0304-3975(94)00202-T","volume":"138","author":"R Alur","year":"1995","unstructured":"Alur R, Courcoubetis C, Halbwachs N, Henzinger TA, Ho PH, Nicollin X, Olivero A, Sifakis J, Yovine S (1995) The algorithmic analysis of hybrid systems. Theor Comput Sci 138:3\u201334","journal-title":"Theor Comput Sci"},{"key":"12_CR3","unstructured":"Ambrosius F (2007) Modelling and distributed controller design of the BodeRC paper-path setup. Master\u2019s thesis, Department of Electrical Engineering, Mathematics and Computer Science, University of Twente, appeared as Technical Report 003CE2007"},{"key":"12_CR4","volume-title":"Dynamical systems for creative technology","author":"J van Amerongen","year":"2010","unstructured":"van Amerongen J (2010) Dynamical systems for creative technology. Controllab Products, Enschede"},{"key":"12_CR5","volume-title":"The designer\u2019s guide to VHDL","author":"PJ Ashenden","year":"2001","unstructured":"Ashenden PJ (2001) The designer\u2019s guide to VHDL, 2nd edn. Morgan Kaufmann Publishers, San Francisco","edition":"2"},{"key":"12_CR6","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"Avizienis A, Laprie JC, Randell B, Landwehr C (2004) Basic concepts and taxonomy of dependable and secure computing. IEEE Trans Dependable Secure Comput 1:11\u201333","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Bae K, \u00d6lveczky PC, Feng TH, Tripakis S (2009) Verifying ptolemy ii discrete-event models using real-time maude. In: Proceedings of the 11th international conference on formal engineering methods: formal methods and software engineering, ICFEM \u201909. Springer, Berlin, pp 717\u2013736","DOI":"10.1007\/978-3-642-10373-5_37"},{"key":"12_CR8","unstructured":"Baheti R, Gill H (2011) Cyber-physical systems. In: Samad T, Annaswamy A (eds) The impact of control technology. IEEE Control Society, pp 161\u2013166. Available at www.ieeecss.org"},{"key":"12_CR9","unstructured":"Baker RE (2005) An approach for dealing with dynamic multi-attribute decision problems. Ph.D. thesis, Department of Computer Science, University of York, UK"},{"issue":"1","key":"12_CR10","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1109\/JPROC.2011.2165689","volume":"100","author":"A Banerjee","year":"2012","unstructured":"Banerjee A, Venkatasubramanian KK, Mukherjee T, Gupta SKS (2012) Ensuring safety, security, and sustainability of mission-critical cyber-physical systems. Proc IEEE 100(1):283\u2013299. doi:10.1109\/JPROC.2011.2165689","journal-title":"Proc IEEE"},{"key":"12_CR11","volume-title":"Discrete-event system simulation","author":"J Banks","year":"2004","unstructured":"Banks J, Carson J, Nelson BL, Nicol D (2004) Discrete-event system simulation, 4th edn. Prentice Hall, Upper Saddle River","edition":"4"},{"key":"12_CR12","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/978-3-540-27863-4_10","volume-title":"SoftSpez Final Report","author":"K Berkenk\u00f6tter","year":"2004","unstructured":"Berkenk\u00f6tter K, Bisanz S, Hannemann U, Peleska J (2004) Executable hybriduml and its application to train control systems. In: Ehrig H, Damm W, Desel J, Grosse-Rhode M, Reif W, Schnieder E, Westk\u00e4mper E (eds) SoftSpez Final Report. Lecture notes in computer science, vol 3147. Springer, Berlin, pp 145\u2013173"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Blochwitz T, Otter M, Akesson J, Arnold M, Clauss C, Elmqvist H, Friedrich M, Junghanns A, Mauss J, Neumerkel D, Olsson H, Viel A (2012) The functional mockup interface 2.0: the standard for tool independent exchange of simulation models. In: Proceedings of the 9th international Modelica conference, Munich","DOI":"10.3384\/ecp12076173"},{"issue":"Suppl 3","key":"12_CR14","doi-asserted-by":"publisher","first-page":"7280","DOI":"10.1073\/pnas.082080899","volume":"99","author":"E Bonabeau","year":"2002","unstructured":"Bonabeau E (2002) Agent-based modeling: methods and techniques for simulating human systems. Proc Natl Acad Sci USA 99(Suppl 3):7280\u20137287. doi:10.1073\/pnas.082080899","journal-title":"Proc Natl Acad Sci USA"},{"key":"12_CR15","volume-title":"The unified modelling language user guide","author":"G Booch","year":"1999","unstructured":"Booch G, Jacobson I, Rumbaugh J (1999) The unified modelling language user guide. Addison-Wesley, Reading"},{"issue":"3","key":"12_CR16","first-page":"22","volume":"38","author":"JF Broenink","year":"1997","unstructured":"Broenink JF (1997) Modelling, simulation and analysis with 20-Sim. J A Spec Issue CACSD 38(3):22\u201325","journal-title":"J A Spec Issue CACSD"},{"key":"12_CR17","first-page":"659","volume-title":"Proceedings of SIMPAR 2010 workshops international conference on simulation, modeling, and programming for autonomous robots","author":"JF Broenink","year":"2010","unstructured":"Broenink JF, Ni Y, Groothuis MA (2010) On model-driven design of robot software using co-simulation. In: Menegatti E (ed) Proceedings of SIMPAR 2010 workshops international conference on simulation, modeling, and programming for autonomous robots. TU Darmstadt, Darmstadt, pp 659\u2013668"},{"issue":"3","key":"12_CR18","first-page":"389","volume":"93","author":"D Broman","year":"2013","unstructured":"Broman D, Derler P, Eidson J (2013) Temporal issues in cyber-physical systems. J Indian Inst Sci 93(3):389\u2013402","journal-title":"J Indian Inst Sci"},{"key":"12_CR19","doi-asserted-by":"publisher","unstructured":"Broy M, Cengarle MV, Geisberger E (2012) Cyber-physical systems: imminent challenges. In: Calinescu R, Garlan D (eds) Large-scale complex IT systems. Development, operation and management. Lecture notes in computer science, vol 7539. Springer, Berlin, pp 1\u201328. doi:10.1007\/978-3-642-34059-8","DOI":"10.1007\/978-3-642-34059-8"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Bruun H, Damm F, Hansen BS (1991) An approach to the static semantics of VDM-SL. In: VDM \u201991: formal software development methods, VDM Europe. Springer, Berlin, pp 220\u2013253","DOI":"10.1007\/3-540-54834-3_15"},{"issue":"3","key":"12_CR21","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MCS.2003.1200240","volume":"23","author":"A Cervin","year":"2003","unstructured":"Cervin A, Henriksson D, Lincoln B, Eker J, Arzen K (2003) How does control timing affect performance? Analysis and simulation of timing using jitterbug and truetime. IEEE Control Syst 23(3):16\u201330. doi:10.1109\/MCS.2003.1200240","journal-title":"IEEE Control Syst"},{"key":"12_CR22","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/40.296155","volume":"14","author":"M Chiodo","year":"1994","unstructured":"Chiodo M, Giusto P, Jurecska A, Hsieh HC, Sangiovanni-Vincentelli A, Lavagno L (1994) Hardware-software codesign of embedded systems. IEEE Micro 14:26\u201336","journal-title":"IEEE Micro"},{"key":"12_CR23","unstructured":"Christiansen MP, Larsen M, J\u00f8rgensen RN (2013) Collaborative model based development of adaptive controller settings for a load-carrying vehicle with changing loads. In: Bochtis DD, S\u00f8rensen CAG (eds) CIOSTA XXXV conference"},{"key":"12_CR24","unstructured":"Coleman JW, Lausdahl KG, Larsen PG (2012) D3.4b\u2014co-simulation semantics. Tech. Rep., The DESTECS Project (CNECT-ICT-248134)"},{"key":"12_CR25","first-page":"7","volume-title":"Progress White Papers 2006","author":"H Corporaal","year":"2006","unstructured":"Corporaal H (2006) Embedded system design. In: Karelse F (ed) Progress White Papers 2006. STW, Utrecht, pp 7\u201327"},{"key":"12_CR26","unstructured":"Coverity (2012) Coverity Scan: 2012 Open Source Report. Tech. Rep., Coverity"},{"key":"12_CR27","isbn-type":"print","doi-asserted-by":"crossref","DOI":"10.1201\/9781482267419","volume-title":"The VDM-SL reference guide","author":"J Dawes","year":"1991","unstructured":"Dawes J (1991) The VDM-SL reference guide. Pitman, London. ISBN 0-273-03151-1","ISBN":"https:\/\/id.crossref.org\/isbn\/0273031511"},{"key":"12_CR28","unstructured":"DESTECS09 (2009) DESTECS (Design support and tooling for embedded control software). European Research Project"},{"issue":"1","key":"12_CR29","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/JPROC.2011.2161237","volume":"100","author":"J Eidson","year":"2012","unstructured":"Eidson J, Lee E, Matic S, Seshia S, Zou J (2012) Distributed real-time software for cyber-physical systems. Proc IEEE 100(1):45\u201359. doi:10.1109\/JPROC.2011.2161237","journal-title":"Proc IEEE"},{"issue":"1","key":"12_CR30","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1109\/JPROC.2002.805829","volume":"91","author":"J Eker","year":"2003","unstructured":"Eker J, Janneck J, Lee E, Liu J, Liu X, Ludvig J, Neuendorffer S, Sachs S, Xiong Y (2003) Taming heterogeneity\u2014the ptolemy approach. Proc IEEE 91(1):127\u2013144","journal-title":"Proc IEEE"},{"key":"12_CR31","unstructured":"European Cooperation for Space Standardization (ECSS) (2009) ECSS Std ECSS-E-ST-40C Space engineering\u2014software"},{"key":"12_CR32","unstructured":"European Cooperation for Space Standardization (ECSS) (2009) ECSS Std ECSS-Q-ST-80C Space product assurance\u2014software product assurance"},{"key":"12_CR33","doi-asserted-by":"crossref","unstructured":"Eveleens JL, Verhoef C (2010) The rise and fall of the chaos report figures. IEEE Software, pp 30\u201336","DOI":"10.1109\/MS.2009.154"},{"key":"12_CR34","isbn-type":"print","volume-title":"Modelling systems\u2014practical tools and techniques in software development","author":"J Fitzgerald","year":"1998","unstructured":"Fitzgerald J, Larsen PG (1998) Modelling systems\u2014practical tools and techniques in software development. Cambridge University Press, Cambridge. ISBN 0-521-62348-0","ISBN":"https:\/\/id.crossref.org\/isbn\/0521623480"},{"key":"12_CR35","isbn-type":"print","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511626975","volume-title":"Modelling systems\u2014practical tools and techniques in software development","author":"J Fitzgerald","year":"2009","unstructured":"Fitzgerald J, Larsen PG (2009) Modelling systems\u2014practical tools and techniques in software development, 2nd edn. Cambridge University Press, Cambridge. ISBN 0-521-62348-0","ISBN":"https:\/\/id.crossref.org\/isbn\/0521623480","edition":"2"},{"key":"12_CR36","volume-title":"Validated designs for object-oriented systems","author":"J Fitzgerald","year":"2005","unstructured":"Fitzgerald J, Larsen PG, Mukherjee P, Plat N, Verhoef M (2005) Validated designs for object-oriented systems. Springer, New York"},{"key":"12_CR37","volume-title":"Wiley encyclopedia of computer science and engineering","author":"JS Fitzgerald","year":"2008","unstructured":"Fitzgerald JS, Larsen PG, Verhoef M (2008) Vienna development method. In: Wah B (ed) Wiley encyclopedia of computer science and engineering. Wiley, Chichester"},{"key":"12_CR38","doi-asserted-by":"crossref","unstructured":"Fritzson P, Engelson V (1998) Modelica\u2014a unified object-oriented language for system modelling and simulation. In: ECCOP \u201998: proceedings of the 12th European conference on object-oriented programming. Springer, Berlin, pp 67\u201390","DOI":"10.1007\/BFb0054087"},{"key":"12_CR39","volume-title":"Design patterns. Elements of reusable object-oriented software","author":"E Gamma","year":"1995","unstructured":"Gamma E, Helm R, Johnson R, Vlissides J (1995) Design patterns. Elements of reusable object-oriented software. Addison-Wesley professional computing series. Addison-Wesley, Reading"},{"issue":"1","key":"12_CR40","first-page":"57","volume":"1","author":"SK Gupta","year":"2011","unstructured":"Gupta SK, Mukherjee T, Varsamopoulos G, Banerjee A (2011) Research directions in energy-sustainable cyber-physical systems. Sustain Comput Inform Syst 1(1):57\u201374","journal-title":"Sustain Comput Inform Syst"},{"issue":"11\/12","key":"12_CR41","doi-asserted-by":"publisher","first-page":"688","DOI":"10.1177\/0037549709105240","volume":"85","author":"C Hardebolle","year":"2009","unstructured":"Hardebolle C, Boulanger F (2009) Exploring multi-paradigm modeling techniques. SIMULATION Trans Soc Model Simul Int 85(11\/12):688\u2013708","journal-title":"SIMULATION Trans Soc Model Simul Int"},{"key":"12_CR42","volume-title":"Boderc: model-based design of high-tech systems","author":"M Heemels","year":"2007","unstructured":"Heemels M, Muller G (2007) Boderc: model-based design of high-tech systems, 2nd edn. Embedded Systems Institute, Eindhoven","edition":"2"},{"key":"12_CR43","doi-asserted-by":"crossref","unstructured":"IEEE (2000) IEEE 100 the authoritative dictionary of IEEE standards terms, 7th edn. IEEE Std 100-2000. doi:10.1109\/IEEESTD.2000.322230","DOI":"10.1109\/IEEESTD.2000.322230"},{"key":"12_CR44","unstructured":"IEEE (2008) International Standard ISO\/IEC 12207:2008(E), IEEE Std 12207-2008 (Revision of IEEE\/EIA 12207.0-1996) Systems and software engineering\u2014software life cycle processes. ISO\/IEC and IEEE Computer Society"},{"key":"12_CR45","unstructured":"IEEE (2008) International Standard ISO\/IEC 15288:2008(E), IEEE Std 15288-2008 (Revision of IEEE Std 15288-2004) Systems and software engineering\u2014system life cycle processes. ISO\/IEC and IEEE Computer Society"},{"issue":"4","key":"12_CR46","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/1498765.1498787","volume":"52","author":"D Jackson","year":"2009","unstructured":"Jackson D (2009) A direct path to dependable software. Commun ACM 52(4):78\u201388. doi:10.1145\/1498765.1498787","journal-title":"Commun ACM"},{"key":"12_CR47","doi-asserted-by":"crossref","unstructured":"Jensen J, Chang D, Lee E (2011) A model-based design methodology for cyber-physical systems. In: 2011 7th international wireless communications and mobile computing conference (IWCMC), pp 1666\u20131671. doi:10.1109\/IWCMC.2011.5982785","DOI":"10.1109\/IWCMC.2011.5982785"},{"key":"12_CR48","series-title":"Lecture notes in computer science","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/11526841_3","volume-title":"FM 2005: formal methods","author":"CW Johnson","year":"2005","unstructured":"Johnson CW (2005) The natural history of bugs: using formal methods to analyse software related failures in space missions. In: Fitzgerald J, Hayes IJ, Tarlecki A (eds) FM 2005: formal methods. Lecture notes in computer science, vol 3582. Springer, Berlin, pp 9\u201325"},{"key":"12_CR49","unstructured":"Johnson J (2006) My life is failure. Standish Group International, co-author of the original 1994 CHAOS report"},{"key":"12_CR50","isbn-type":"print","volume-title":"Systematic software development using VDM","author":"CB Jones","year":"1990","unstructured":"Jones CB (1990) Systematic software development using VDM, 2nd edn. Prentice-Hall International, Englewood Cliffs. ISBN 0-13-880733-7","ISBN":"https:\/\/id.crossref.org\/isbn\/0138807337","edition":"2"},{"key":"12_CR51","unstructured":"JPL Special Review Board (2000) Report on the loss of the Mars Polar Lander and Deep Space 2 missions. Tech. Rep. JPL D-18709. Jet Propulsion Laboratory"},{"key":"12_CR52","volume-title":"Analysis and simulation of multiport systems: the bond graph approach to physical system dynamic","author":"D Karnopp","year":"1968","unstructured":"Karnopp D, Rosenberg R (1968) Analysis and simulation of multiport systems: the bond graph approach to physical system dynamic. MIT Press, Cambridge"},{"key":"12_CR53","unstructured":"Kleijn C (2009) 20-sim 4.1 reference manual, 1st edn. Controllab Products B.V., Enschede. ISBN 978-90-79499-05-2"},{"key":"12_CR54","unstructured":"Kleijn C, Visser P, Groen F (2012) D3.5\u2014extension to Matlab\/Simulink. Tech. Rep., The DESTECS Project (CNECT-ICT-248134)"},{"issue":"1","key":"12_CR55","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/JPROC.2002.805821","volume":"91","author":"H Kopetz","year":"2003","unstructured":"Kopetz H, Bauer G (2003) The time-triggered architecture. Proc IEEE 91(1):112\u2013126","journal-title":"Proc IEEE"},{"issue":"1","key":"12_CR56","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1668862.1668864","volume":"35","author":"PG Larsen","year":"2010","unstructured":"Larsen PG, Battle N, Ferreira M, Fitzgerald J, Lausdahl K, Verhoef M (2010) The overture initiative\u2014integrating tools for VDM. SIGSOFT Softw Eng Notes 35(1):1\u20136","journal-title":"SIGSOFT Softw Eng Notes"},{"key":"12_CR57","isbn-type":"print","first-page":"278","volume-title":"8th IEEE international conference on software engineering and formal methods, SEFM \u201910","author":"Larsen PG, Lausdahl K, Battle N (2010) Combinatorial testing for VDM. In: Proceedings of the","year":"2010","unstructured":"Larsen PG, Lausdahl K, Battle N (2010) Combinatorial testing for VDM. In: Proceedings of the 2010 8th IEEE international conference on software engineering and formal methods, SEFM \u201910. IEEE Computer Society, Washington, pp 278\u2013285. ISBN 978-0-7695-4153-2","ISBN":"https:\/\/id.crossref.org\/isbn\/9780769541532"},{"key":"12_CR58","unstructured":"Larsen PG, Wolff S, Battle N, Fitzgerald J, Pierce K (2010) Development process of distributed embedded systems using vdm. Tech. Rep. TR-2010-02, The Overture Open Source Initiative"},{"key":"12_CR59","unstructured":"Larsen PG, Lausdahl K, Battle N, Fitzgerald J, Wolff S, Sahara S (2013) VDM-10 language manual. Tech. Rep. TR-001, The Overture Initiative"},{"key":"12_CR60","unstructured":"Larsen PG, Lausdahl K, Coleman J, Wolff S, Kleijn C, Groen F (2013) Crescendo tool support: user manual. Tech. Rep. TR-001, The Crescendo Initiative"},{"key":"12_CR61","doi-asserted-by":"crossref","unstructured":"Lausdahl K, Coleman JW, Larsen PG (2013) Semantics of the VDM real-time dialect. ECE-TR-13, Aarhus University, Aarhus, April 2013","DOI":"10.7146\/ece.v2i13.21228"},{"key":"12_CR62","isbn-type":"print","volume-title":"Introduction to embedded systems, a cyber-physical systems approach","author":"E Lee","year":"2011","unstructured":"Lee E, Seshia S (2011) Introduction to embedded systems, a cyber-physical systems approach. University of Berkeley, Berkeley. ISBN 978-0-557-70857-4","ISBN":"https:\/\/id.crossref.org\/isbn\/9780557708574"},{"key":"12_CR63","doi-asserted-by":"crossref","unstructured":"Lee EA (2008) Cyber physical systems: design challenges. Tech. Rep. UCB\/EECS-2008-8, EECS Department, University of California, Berkeley","DOI":"10.1109\/ISORC.2008.25"},{"issue":"5","key":"12_CR64","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1145\/1506409.1506426","volume":"52","author":"EA Lee","year":"2009","unstructured":"Lee EA (2009) Computing needs time. Commun ACM 52(5):70\u201379","journal-title":"Commun ACM"},{"key":"12_CR65","doi-asserted-by":"crossref","unstructured":"Lee EA (2010) CPS foundations. In: Proceedings of the 47th design automation conference, DAC \u201910. ACM, New York, pp 737\u2013742. doi:10.1145\/1837274.1837462","DOI":"10.1145\/1837274.1837462"},{"issue":"1","key":"12_CR66","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/JPROC.2011.2165270","volume":"100","author":"I Lee","year":"2012","unstructured":"Lee I, Sokolsky O, Chen S, Hatcliff J, Jee E, Kim B, King A, Mullen-Fortino M, Park S, Roederer A, Venkatasubramanian K (2012) Challenges and research directions in medical cyber-physical systems. Proc IEEE 100(1):75\u201390. doi:10.1109\/JPROC.2011.2165270","journal-title":"Proc IEEE"},{"key":"12_CR67","volume-title":"ARIANE 5\u2014flight 501 failure\u2014report by the inquiry board","author":"JL Lions","year":"1996","unstructured":"Lions JL, L\u00fcbeck L, Fauquembergue JL, Kahn G, Kubbat W, Levedag S, Mazzini L, Merle D, O\u2019Halloran C (1996) ARIANE 5\u2014flight 501 failure\u2014report by the inquiry board. Tech. Rep., European Space Agency"},{"key":"12_CR68","unstructured":"Liu J (1998) Continuous time and mixed-signal simulation in ptolemy ii. Tech. Rep. UCB\/ERL M98\/74, EECS Department, University of California, Berkeley"},{"issue":"5","key":"12_CR69","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1631\/jzus.C1200263","volume":"14","author":"G Magureanu","year":"2013","unstructured":"Magureanu G, Gavrilescu M, Pescaru D (2013) Validation of static properties in unified modeling language models for cyber physical systems. J Zhejiang Univ Sci C 14(5):332\u2013346. doi:10.1631\/jzus.C1200263","journal-title":"J Zhejiang Univ Sci C"},{"key":"12_CR70","volume-title":"Architecting principles for systems-of-systems","author":"MW Maier","year":"1996","unstructured":"Maier MW (1996) Architecting principles for systems-of-systems. In: Sixth international symposium of the international council on systems engineering, INCOSE"},{"key":"12_CR71","unstructured":"Margaria T, Sch\u00e4tz B, Verhoef M (2006) Formal methods going mainstream: costs, benefits, experiences. BCS-FACS FACTS 2006(2):34\u201338, report on the ForTIA Industry Day at FM\u201905"},{"key":"12_CR72","volume-title":"Embedded system design\u2014embedded systems foundations of cyber-physical systems","author":"P Marwedel","year":"2010","unstructured":"Marwedel P (2010) Embedded system design\u2014embedded systems foundations of cyber-physical systems. Springer, Berlin"},{"key":"12_CR73","doi-asserted-by":"crossref","unstructured":"Mazzara M, Bhattacharyya A (2010) On modelling and analysis of dynamic reconfiguration of dependable real-time systems. In: 2010 third international conference on dependability (DEPEND), pp 173\u2013181. doi:10.1109\/DEPEND.2010.33","DOI":"10.1109\/DEPEND.2010.33"},{"key":"12_CR74","doi-asserted-by":"crossref","unstructured":"Miclea L, Sanislav T (2011) About dependability in cyber-physical systems. In: Design test symposium (EWDTS), 2011 9th East-West, pp 17\u201321. doi:10.1109\/EWDTS.2011.6116428","DOI":"10.1109\/EWDTS.2011.6116428"},{"issue":"8","key":"12_CR75","first-page":"114","volume":"38","author":"GE Moore","year":"1965","unstructured":"Moore GE (1965) Cramming more components onto integrated circuits. Electronics 38(8):114\u2013117","journal-title":"Electronics"},{"key":"12_CR76","volume-title":"Dynamic reconfiguration of distributed systems in VDM-RT","author":"CB Nielsen","year":"2010","unstructured":"Nielsen CB (2010) Dynamic reconfiguration of distributed systems in VDM-RT. Master\u2019s thesis, Aarhus University"},{"key":"12_CR77","unstructured":"Plotkin GD (1981) A structural approach to operational semantics. Tech. Rep. DAIMI FN-19, Aarhus University"},{"key":"12_CR78","first-page":"17","volume":"60\u201361","author":"GD Plotkin","year":"2004","unstructured":"Plotkin GD (2004) A structural approach to operational semantics. J Logic Algebraic Program 60\u201361:17\u2013139","journal-title":"J Logic Algebraic Program"},{"key":"12_CR79","unstructured":"Ptolemaeus C (ed) (2014) System design, modeling, and simulation using ptolemy II. Ptolemy.org"},{"key":"12_CR80","unstructured":"Pumfrey D (1999) The principled design of computer system safety analyses. Ph.D. thesis, Department of Computer Science, University of York"},{"key":"12_CR81","doi-asserted-by":"crossref","unstructured":"Rajkumar R, Lee I, Sha L, Stankovic J (2010) Cyber-physical systems: the next computing revolution. In: Design automation conference (DAC), 2010 47th ACM\/IEEE, pp 731\u2013736","DOI":"10.1145\/1837274.1837461"},{"key":"12_CR82","unstructured":"Rational Software Corporation (1998) Rational unified process\u2014best practices for software development teams"},{"key":"12_CR83","volume-title":"Simulation: the practice of model development and use","author":"S Robinson","year":"2004","unstructured":"Robinson S (2004) Simulation: the practice of model development and use. Wiley, New York"},{"key":"12_CR84","isbn-type":"print","volume-title":"Industrial deployment of system engineering methods providing high dependability and productivity","year":"2013","unstructured":"Romanovsky A, Thomas M (eds) (2013) Industrial deployment of system engineering methods providing high dependability and productivity. Springer, Berlin. ISBN 978-3-642-33169-5","ISBN":"https:\/\/id.crossref.org\/isbn\/9783642331695"},{"key":"12_CR85","first-page":"210","volume-title":"Kernels for safety? In: Safe and secure computing systems","author":"J Rushby","year":"1989","unstructured":"Rushby J (1989) Kernels for safety? In: Safe and secure computing systems, Blackwell Scientific Publications, Oxford, pp 210\u2013220"},{"key":"12_CR86","unstructured":"Safety and Health Council of the Chemical Industries Association Ltd (1977) A guide to hazard and operability studies"},{"key":"12_CR87","isbn-type":"print","volume-title":"A practical guide to SysML","author":"S Friedenthal","year":"2011","unstructured":"Friedenthal S, Moore A, Steiner R (2011) A practical guide to SysML, 2nd edn. Morgan Kaufmann OMG Press, Waltham. ISBN: 978-0-12-385206-9","ISBN":"https:\/\/id.crossref.org\/isbn\/9780123852069","edition":"2"},{"key":"12_CR88","unstructured":"Sangiovanni-Vincentelli A (2006) Successive refinements of communication functions and architectures in system design. In: Design automation and test in Europe, hot topic session\u2014network the next \u201cBig Idea\u201d in design?"},{"key":"12_CR89","series-title":"Lecture notes in computer science","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/978-3-642-39637-3_29","volume-title":"Computational science and its applications\u2014ICCSA 2013","author":"M Sanwal","year":"2013","unstructured":"Sanwal M, Hasan O (2013) Formal verification of cyber-physical systems: coping with continuous elements. In: Murgante B, Misra S, Carlini M, Torre C, Nguyen HQ, Taniar D, Apduhan B, Gervasi O (eds) Computational science and its applications\u2014ICCSA 2013. Lecture notes in computer science, vol 7971. Springer, Berlin, pp 358\u2013371. doi:10.1007\/978-3-642-39637-39"},{"issue":"1","key":"12_CR90","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MC.2013.31","volume":"46","author":"G Schirner","year":"2013","unstructured":"Schirner G, Erdogmus D, Chowdhury K, Padir T (2013) The future of human-in-the-loop cyber-physical systems. Computer 46(1):36\u201345","journal-title":"Computer"},{"issue":"1","key":"12_CR91","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/JPROC.2011.2161529","volume":"100","author":"J Sztipanovits","year":"2012","unstructured":"Sztipanovits J, Koutsoukos X, Karsai G, Kottenstette N, Antsaklis P, Gupta V, Goodwine B, Baras J, Wang S (2012) Toward a science of cyber-physical system integration. Proc IEEE 100(1):29\u201344. doi:10.1109\/JPROC.2011.2161529","journal-title":"Proc IEEE"},{"key":"12_CR92","volume-title":"System of experimental design, vols 1 and 2","author":"G Taguchi","year":"1987","unstructured":"Taguchi G (1987) System of experimental design, vols 1 and 2. UNIPUB\/Krass International Publications, New York"},{"key":"12_CR93","volume-title":"The Verilog hardware description language","author":"D Thomas","year":"2008","unstructured":"Thomas D, Moorby P (2008) The Verilog hardware description language, 5th edn. Springer, Berlin","edition":"5"},{"key":"12_CR94","doi-asserted-by":"crossref","unstructured":"Trapp M, Schneider D, Liggesmeyer P (2013) A safety roadmap to cyber-physical systems. In: M\u00fcnch J, Schmid K (eds) Perspectives on the future of software engineering. Springer, Berlin, pp 81\u201394. doi:10.\u20091007\u2215978-3-642-37395-46","DOI":"10.1007\/978-3-642-37395-4_6"},{"key":"12_CR95","unstructured":"Vangheluwe HL, de Lara J, Mosterman PJ (2002) An introduction to multi-paradigm modelling and simulation. In: Barros F, Giambiasi N (eds) Proceedings of the AIS\u20192002 conference (AI, Simulation and Planning in High Autonomy Systems), Lisboa, Portugal, pp 9\u201320"},{"key":"12_CR96","unstructured":"Verhoef M (2009) Modeling and validating distributed embedded real-time control systems. Ph.D. thesis, Radboud University Nijmegen"},{"key":"12_CR97","unstructured":"Verhoef M, Bos B, van Eijk P, Remijnse J, Visser E, De Paepe M, De Witte Y, Rombaut K, Van Lembergen R (2012) Industrial case studies\u2014final report. DESTECS Deliverable D4.3, The DESTECS Project (CNECT-ICT-248134)"},{"key":"12_CR98","doi-asserted-by":"crossref","unstructured":"Wan K, Hughes D, Man KL, Krilavicius T (2010) Composition challenges and approaches for cyber physical systems. In: 2010 IEEE international conference on networked embedded systems for enterprise applications (NESEA), pp 1\u20137. doi:10.1109\/NESEA.2010.5678065","DOI":"10.1109\/NESEA.2010.5678065"},{"key":"12_CR99","doi-asserted-by":"crossref","unstructured":"Wang G, Liu Q, Wu J (2010) Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: Proceedings of the 17th ACM conference on computer and communications security. ACM, New York, pp 735\u2013737","DOI":"10.1145\/1866307.1866414"},{"issue":"4","key":"12_CR100","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1592434.1592436","volume":"41","author":"J Woodcock","year":"2009","unstructured":"Woodcock J, Larsen PG, Bicarregui J, Fitzgerald J (2009) Formal methods: practice and experience. ACM Comput Surv 41(4):1\u201336","journal-title":"ACM Comput Surv"}],"container-title":["Collaborative Design for Embedded Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54118-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T14:32:15Z","timestamp":1746196335000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-54118-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642541179","9783642541186"],"references-count":100,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54118-6_12","relation":{},"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"17 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}