<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>1st International Workshop on Requirements Engineering for Self-Adaptive and Cyber-Physical Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Marian Daun</string-name>
          <email>marian.daun@paluno.uni-due.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Cristina Palomares</string-name>
          <email>cpalomares@essi.upc.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Itzel Morales Ramírez</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bastian Tenbergen</string-name>
          <email>bastian.tenbergen@paluno.uni-due.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>- Bournemouth University, UK - Airbus Defence and Space, Germany - Utrecht University, Netherlands - Robert Bosch GmbH, Germany - Beijing University, China - Fondazione Bruno Kessler, Italy - Universitat Politècnica de Catalunya, Spain - Fondazione Bruno Kessler, Italy - Federal University of Espírito Santo</institution>
          ,
          <country country="BR">Brazil</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Software Engineering Research Unit, Fondazione Bruno Kessler - IRST</institution>
          ,
          <addr-line>Trento</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Universitat Politècnica de Catalunya</institution>
          ,
          <addr-line>Barcelona</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>paluno - The Ruhr Institute for Software Technology, University of Duisburg-Essen</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <fpage>140</fpage>
      <lpage>141</lpage>
      <abstract>
        <p>Over the last ten years, self-adaptive systems (SAS) and cyber-physical systems (CPS) have attracted the attention of the research community. Self-adaptivity and cyber-physicality are increasingly important properties of software-intensive systems, which give rise to new challenges for system development. Their highly connected and context-aware nature leads to changes in their runtime behavior, stressing the need for runtime adaptation and reorganization. These challenges must be addressed by engineering these systems to be self-adaptive and cyber physical at the earliest possible stages during development: during requirements engineering. In the spirit of RESACS's mother conference, REFSQ, this workshop aimed to provide a platform to exchange ideas about new approaches to requirements engineering for SAS and CPS.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        The workshop program was at the same time diverse and fascinating. One of the core
topics discussed was trustworthiness. Goldsteen et al. [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] present a tool support to
monitor the satisfaction of trustworthiness requirements during runtime. A
fundamental prerequisite to be able to monitor trustworthiness at runtime, however, is that
during requirements engineering detrimental factors which impair trustworthiness are
considered. For this purpose, Bandyszak et al. [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] provide a process model, according
to which the requirements engineering process for cyber physical systems can be
structured to account for trustworthiness and enable CPS trustworthiness monitoring
at runtime through tools. Similarly, Kneer and Kamsties [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] present an approach to
generate a model-based requirements monitor, which enables users to survey
requirements satisfaction during runtime adaptation in self-adaptive systems. Runtime
adaptation gives rise to a significant degree of uncertainty about the system behavior
and context configuration at runtime. Brings et al. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] present an investigation into the
state of the art on dealing with this type of uncertainty and point out that one
commonality between SAS and CPS is hence the need to monitor requirements
satisfaction, be it functional or quality requirements (e.g., trustworthiness), at runtime. A
prerequisite to do so is, however, that the requirements to be monitored are known to
the system itself. Tenoyo et al. [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] propose a model-based approach to aid artifact
development in reengineering projects, which could be used to introduce
development-time requirements into the runtime knowledge base of a system. However, for
SAS and CPS, adaptation must not only be accounted for during runtime, but also
during development time. In this sense, Battram et al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] present an approach to
verify CPS component organizations by making use of multi-aspect contracts, which
enables developers to reuse CPS components. Albers and Dörfel [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] apply real-time
analysis on CPS to simulate their timing behavior in adaptive settings.
3
      </p>
    </sec>
    <sec id="sec-2">
      <title>Workshop Technicalities</title>
      <p>Each paper has received three reviews from program committee members and
organizers. The reviews aimed at improving the soundness of the presented ideas and
giving new impulses for future research. Based on the reviews, seven papers were
accepted for presentation at the workshop. In total, 25% of the submitted manuscripts
were accepted as full papers, 37.5% as short papers, and 25% for poster presentation.</p>
      <p>We, the organizers, are indebted to the program committee members:</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Goldsteen</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moffie</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bandyszak</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gol Mohammadi</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Meichanetzoglou</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ioannidis</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chatziadam</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>A Tool for Monitoring and Maintaining System Trustworthiness at Runtime</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Bandyszak</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gol Mohammadi</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bishr</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goldsteen</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moffie</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nasser</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hartenstein</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Meichanetzoglou</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Cyber-Physical Systems Design for Runtime Trustworthiness Maintenance Supported by Tools</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Kneer</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kamsties</surname>
          </string-name>
          , E.:
          <article-title>Model-based Generation of a Requirements Monitor</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Brings</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Salmon</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Saritas</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Context Uncertainty in Requirements Engineering: Definition of a Search Strategy for a Systematic Review and Preliminary Results</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Tenoyo</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mursanto</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Azurat</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Manurung</surname>
            ,
            <given-names>H.M.</given-names>
          </string-name>
          :
          <article-title>Developing Artifact with Concept Relationship Oriented Methodology, a Progress Report</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Battram</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kaiser</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weber</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <string-name>
            <given-names>A Modular</given-names>
            <surname>Safety</surname>
          </string-name>
          <article-title>Assurance Method considering Multi-Aspect Contracts during Cyber Physical System Design</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Albers</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dörfel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Using Timing paths to validate end-to-end requirements with methods of schedulability simulation and analysis</article-title>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>