Safeware: system safety and computers
Safeware: system safety and computers
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy
Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence
Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence
Requirements Engineering: Processes and Techniques
Requirements Engineering: Processes and Techniques
Self-Organizing Manufacturing Control: An Industrial Application of Agent Technology
ICMAS '00 Proceedings of the Fourth International Conference on MultiAgent Systems (ICMAS-2000)
DEXA '03 Proceedings of the 14th International Workshop on Database and Expert Systems Applications
Ontology mapping: the state of the art
The Knowledge Engineering Review
Basic Concepts and Taxonomy of Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing
Software Product Line Engineering: Foundations, Principles and Techniques
Software Product Line Engineering: Foundations, Principles and Techniques
Mastering the complexity of reactive systems: the AutoFocus approach
Formal methods for embedded distributed systems
On the Systems Engineering and Management of Systems of Systems and Federations of Systems
Information-Knowledge-Systems Management
Proceedings of the 2008 Asia and South Pacific Design Automation Conference
IPv6 Security
OPC Unified Architecture
Artificial Intelligence: A Modern Approach
Artificial Intelligence: A Modern Approach
An Introduction to MultiAgent Systems
An Introduction to MultiAgent Systems
Requirement-centric traceability for change impact analysis: a case study
ICSP'08 Proceedings of the Software process, 2008 international conference on Making globally distributed software development a success story
Privacy in inter-vehicular networks: why simple pseudonym change is not enough
WONS'10 Proceedings of the 7th international conference on Wireless on-demand network systems and services
SignalGuru: leveraging mobile phones for collaborative traffic signal schedule advisory
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Comprehensive experimental analyses of automotive attack surfaces
SEC'11 Proceedings of the 20th USENIX conference on Security
Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August ... in Information and Communication Technology)
The proceedings of the 13th international ACM SIGACCESS conference on Computers and accessibility
Hi-index | 0.00 |
A German project is presented which was initiated in order to analyse the potential and risks associated with Cyber-Physical Systems. These have been recognised as the next wave of innovation in information and communication technology. Cyber-Physical Systems are herein understood in a very broad sense as the integration of embedded systems with global networks such as the Internet. The survey aims at deepening understanding the impact of those systems at technological and economical level as well as at political and sociological level. The goal of the study is to collect arguments for decision makers both in business and politics to take actions in research, legislation and business development.