<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Software Engineering Doctoral Symposium, Sept</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Digital Twins for Continuous Deployment in Model-Based Systems Engineering of Cyber-Physical Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Joost Mertens</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Joachim Denil</string-name>
        </contrib>
      </contrib-group>
      <pub-date>
        <year>2020</year>
      </pub-date>
      <volume>08</volume>
      <issue>2020</issue>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>Cyber-Physical Systems (CPS) are required to operate over a longer lifetime. As such, their requirements can change, requiring updates to the system to be be rolled out continuously (Continuous Deployment) throughout the system's lifetime. The DevOps methodology provides a structured, quality assuring way to do so, as it integrates Development and Operations of a system in a continuous cycle. DevOps is generally applied in software development, however in the design of CPS, which follows a ModelBased Systems Engineering (MBSE) approach, it is not. This is because many challenges remain in the application of DevOps in MBSE. Our focus is on creating the foundations for continuous deployment of safety-critical CPS using digital twins of the CPS.k.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Continuous Deployment</kwd>
        <kwd>Cyber-Physical Systems</kwd>
        <kwd>Model-Based Systems Engineering</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>harsh conditions, reasoning about the redesign of the system, synchronization between the
system in operation and its models, the virtual deployment of system changes in model-based
testing of these heterogeneous systems.</p>
      <p>Inspired by these challenges, our aim is to create the foundations for continuous deployment
of safety-critical CPS using a digital twin. We aim to do this by applying the DevOps cycle for
the MBSE of CPS. In relation to DevOps, we specifically tackle the challenges in the release,
deploy and monitor phases, visually represented in green/dots in Figure 1. Additionally, we
only tackle the challenges at the technical side of the engineering process, while challenges in
the human aspect of the process are disregarded. In summary, our focus is the development of
new digital-twin enabled methods and techniques to allow the continuous deployment of CPS.
With these techniques, we aim to solve the challenges in the monitoring, release management
and deployment of CPS.</p>
      <p>The remainder of this paper is structured as follows: in Section 2 we cover the state-of-the-art.
Section 3 describes our objectives and approach, after which Section 4 lists past work and
preliminary results. In Section 5, we look at the future, and lastly Section 6 concludes the paper.</p>
    </sec>
    <sec id="sec-2">
      <title>2. State-of-the-Art</title>
      <p>We find relevant research in the areas of (1) digital twins, (2) run-time monitoring in real-time
systems and (3) continuous integration in MBSE.</p>
      <sec id="sec-2-1">
        <title>2.1. Digital Twins</title>
        <p>
          The digital twin is a popular concept in the industry 4.0 domain. In essence a digital twin is
a virtual version of a physical entity, with which it shares data in both directions. As such,
the application potential in the DevOps cycle is high, since it also exchanges information in
such a way. In [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ], the current state of research in digital twins is reviewed. Among their
conclusions is the wide range of applications, and the adoption of digital twins by industry
leaders. One of the noted applications is in System Design and Development. Strikingly is the
fact that the list of current challenges as observed in research is still extensive, from scalability
to trust/privacy issues. Furthermore, the authors note that within manufacturing, the use of
fully integrated digital twins is minimal. Besides Industry 4.0, there are ideas from other fields
that show application potential for digital twins. One such idea is the data driven simulation
paradigm, as demonstrated by Hu for wildfire simulation in [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]. In [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ], the state of a wildfire
simulation is continuously adjusted to match the real state of the wildfire based on sensor
readings, showing strong similarities to digital twins.
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Runtime Monitoring</title>
        <p>
          Runtime monitoring in literature mainly covers the system monitoring itself but does not take
the critical part of data-transfer into account for the DevOps cycle of CPS systems. Medhat
et al. [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] investigated the run-time monitoring of CPS without a task model under timing and
memory constraints. In their research, they propose a dynamic monitoring scheme based
on control theory that monitors the system and tweaks itself based on multiple objectives.
Similarly, in [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] models are instrumented statically for run-time monitoring under hard
realtime constraints. Diferent data-transmission strategies for grouping and sending messages
exist in literature e.g. grouping is possibly done statically or dynamically, at the local node or
edge device, and other choices as seen in [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. A CPS can also engage communication itself to
notify peers and digital twins of state changes. In [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] the authors propose an architecture for
such a case, where a filtering method makes sure that the system remains scalable.
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>2.3. Continuous Integration and Deployment in MBSE</title>
        <p>
          In [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ], the authors surveyed industrial companies for their adoption of continuous integration
(CI) techniques in an MBSE setting. In summary, there is a lack of base functionality for
CI in MBSE. Functional, non-functional, human and business dificulties where identified,
some examples of which are: lack of tool interoperability, lack of synchronization between
models, long build and test times, lack of willingness to model. Nonetheless, the paper shows
that DevOps in the context of model-based (embedded) system design is possible, but that
several challenges need to be resolved. In [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ], the author proposes simulation as a solution to
automate the dificult task of CI for embedded systems where dependencies exist between the
software and the hardware platform. In [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ], a study on continuous deployment for dependable
systems concludes that the state of practice of agile development for safety critical systems
is still immature. They also note that while the basic technologies to perform the continuous
deployment do exist, some challenges remain, again on the topic of tool support and integration.
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Research Objectives and Methodological Approach</title>
      <sec id="sec-3-1">
        <title>3.1. Main Objective</title>
        <p>
          The main goal is to define new methods that overcome current challenges concerning the
continuous deployment of CPS, and tools that facilitate the integration of the digital twins
in these methods. The underlying framework is the DevOps cycle for Model-Based Systems
Engineering. Our approach is to apply multi-paradigm modeling principles to create such
methods and techniques. Multi-paradigm modeling advocates the explicit modeling of all parts
of a system, at diferent abstraction levels using multiple formalisms [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. At the center of our
approach is a model based digital twin of the system as a shared common knowledge base,
which allows further integration of design and operations.
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Sub-Objectives</title>
        <p>(i) Definition of a method to optimize data capture from a system in operation for
the calibration and initialization of digital twins. To use a digital twin, there must be a
synchronization between the real and physical world. This can be achieved by monitoring the
system in operation and using the monitored data to initialize the digital twin. The data logging
is done in the Monitor phase of the DevOps cycle. The problem at hand is a co-design problem.
On the one hand, the initialization of a digital twin is a state estimation of the system, which
is more accurate when more data is used. On the other hand, the CPS being monitored is a
heterogeneous real-time system with limited resources. The system instrumentation introduces
penalties in memory, execution time and, latency. As such, there is a trade-of between the
accuracy of the initialization and the real-time behavior of the system. Additionally, the data
must get to the digital twin. If the digital twin is physically separated from the system, network
transmission is required. A network introduces additional limits and uncertainties: bandwidth,
latency, packet loss.
(ii) Definition of a method to support release management and software deployment
using the digital twin for viability checking. The goal is to create a method that can
perform automated viability checking (testing) of a release on a product family and its
undocumented variants. The challenge lies in the fact that within one product family, various
system variants reside. These variants are either documented (variant by design, e.g. more
expensive, faster) or undocumented (variant due to runtime changes, e.g. replaced parts, wear
and tear, new environments that difer from the initial test conditions). In the testing phases
of a piece of software, it can only be tested against the variants by design. Variants due to
runtime changes should also be tested to ensure compatibility. The shared knowledge of the
digital twin(s) of the system(s) implicitly contains the undocumented changes and can therefore
exclude incompatible candidate systems through viability checking.
(iii) Exploration of computational architectures to support continuous deployment.
The goal is to explore diferent architectures that enable the continuous deployment of
system updates, specifically with regards to the release viability checking of (ii). Not all system
architectures are eficient in this viability checking, especially with regards to the location of
the digital twin. Examples of architectures could be: (a) running centralized digital twins and
performing individual tests. (b) Running centralized digital twins, but grouping systems in
compatible groups, and testing the group. (c) Running decentralized digital twins on edge nodes
and performing individual test. These examples show the variability in the testing architecture.
Finally, complex event processing can lump specific events together in the monitoring hierarchy.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Past Work and Preliminary Results</title>
      <p>
        Our past and current work has mainly focused on sub-objective (i). As described in section 3.2,
this objective concerns the co-optimization of a system and its digital twin to find the optimal
trade-of between the instrumentation load on the system and the accuracy of the digital twin.
For this trade-of analysis it is essential to have: (a) a method of verifying the instrumentation
load on the system, and (b) a method to determine the sensitivity of parts of the model. Thus
far, we have tackled the problem of verifying the load on the system in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. We did so through
formal verification under the assumption of running a priority-preemptive scheduled Real-Time
Operating System on our embedded system with only periodic tasks. Under the prescribed
problem formulation, one obtains a non-linear problem, which we solve with a
branch-andbound solver. We have applied this method to two toy-examples, but also to the use-case of an
autonomous radio-controlled 1/10th scale-car.
      </p>
      <p>In the work on (a), we made various assumptions regarding the expected output from (b),
which is only logical given the co-optimization approach. The focus of our current work is
thus to replace those assumptions with factual data from developing (b). Currently, we are
researching diferent types of data-assimilating digital twins of systems, of which we aim to
generate sensitivity analyses as input for our method from (a). Then, the goal is to combine (a)
and (b) in a single method.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Future Work and Expected Results</title>
      <p>The objectives in section 3.2 are formulated in what we deem chronological order. After
completing objective (i), we aim to first complete objective (ii), and then (iii), since objectives
(ii) and (iii) are inherently linked. The goal for objective (ii) is to perform automated viability
checking in the release and deploy stages of the DevOps cycle. This viability checking will
be based on the current digital twin of the system, we envision an approach similar to virtual
commissioning. In objective (iii) we then specifically aim to look at architectures supporting
this release management. The reason being that we believe the needs for release management
vary greatly between diferent CPS, e.g. the needs for an automated factory are diferent than
those from a fleet of vehicles.</p>
      <p>Lastly, we foresee that various assumptions will be made throughout this work, e.g. in
our current partial solution to sub-objective (i), we still have assumptions with regards to the
data-communication between the digital and physical world. After the first iteration through
the objectives, we aim to perform a second development cycle, which will allow us to further
elaborate on the assumptions made throughout the course.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusions</title>
      <p>In this paper we presented our views on using digital twins to enable continuous deployment in
the field of model-based systems engineering for cyber-physical systems. We briefly introduced
the challenges as covered in literature, and reviewed the related work most relevant to those
challenges we tackle. We described our main objective and three sub-objectives as well as our
past, present and future work on these topics.</p>
    </sec>
    <sec id="sec-7">
      <title>A. Work Plan</title>
      <sec id="sec-7-1">
        <title>A.1. Timeline</title>
        <p>The work plan shown in Figure 2 is divided in 4 work packages. Three of these are for the
sub-objectives, whereas the fourth foresees time for writing papers and general communication.
Each year is divided in 4 quarters, each quarter is further split to 3 months. The People’s months
(PM) column gives an indication of the amount of hours each task receives. In the case of WP4,
the timeline is colored light gray. This indicates that this is working time allotted throughout
the entire 4 years. The work plan timeline cannot show the dependence of tasks on one-another,
which is why the dependency relationship is provided by a design structure matrix.</p>
      </sec>
      <sec id="sec-7-2">
        <title>A.2. Design Structure Matrix</title>
        <p>The design structure matrix shown in Figure 3 shows only one dependence problem, which is
that the definition of the use case depends on the method being developed in T2.2., T3.1. and
T3.2.. Depending on the abilities of this method, the use case must be defined, yet these abilities
are not known beforehand. In our case we tackle this dependence by making assumptions
on those abilities. By then iterating a second time through the design, as can be seen in the
timeline, we can alter the implemented use case where necessary.</p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>B. Poster</title>
      <p>A visual poster summarizing the challenges discussed in this paper can be seen in Figure 4.
t y n</p>
      <p>e
n S rp
e h</p>
      <p>c</p>
      <p>o
y j
,
s
C
f te</p>
      <p>r
m
.
g t</p>
      <p>s
i o</p>
      <p>j
C r {</p>
      <p>;
r e il
o e n</p>
      <p>e
f
n
i n c</p>
      <p>a
n D
i</p>
      <p>m
g i
h</p>
      <p>A la , n
. it em ito
tsem iged tssy iza</p>
      <p>m
sy th e it</p>
      <p>h p
e t o
ed iz
n n tsn co
i o
ra rh e a
ts c m</p>
      <p>n ru is
no sy ts s
c o in ih
a t T
e l e
w t w a -re t</p>
      <p>a
a t a o d
m c n d n e rd n
y is au ign ked l.rd ifen ah ian
lo y }@ ru ra ow tdo teh ltw</p>
      <p>il tp sh l ta
p h n a : g i</p>
      <p>e ca a e e in ig
e P d :1 sa r v t d</p>
      <p>e i c
- . t e e
D r m e in th ce sp th
i</p>
      <p>b s a e t
d ts – , a</p>
      <p>m th f
e y B
ir s [1 so l- f o
u y o e o o n
q d ls d d t i</p>
      <p>e
o</p>
      <p>w
m t</p>
      <p>M e
u y du so l
rae em itn aw in le ita
) it n ) k ig .</p>
      <p>S e co d d SE ca d ge
PC lif t re ie B t a d</p>
      <p>r uo tcu lpp (M e g l
( e
s e
c n th in .y
t t
du re iw tw fte
ro iffe t l a</p>
      <p>n ta s
p d e i e</p>
      <p>g r
em id s</p>
      <p>u
o
t h
t n
i ga e e
t
n w an Th to
e</p>
      <p>m . t
m se
y il e em en
lo i s t m</p>
      <p>m a sy y
ep fa le s lo</p>
      <p>e
d r</p>
      <p>t
d c ts t
e th it l
rre epd li.y d d d
g a
i
o n</p>
      <p>e a
w ro fam th
a u
e th ,s</p>
      <p>t
ft g e</p>
      <p>m n n
o n
s n o a o ia</p>
      <p>r
e d a
g fte in</p>
      <p>n se v
in o ts i
g n e ab ted</p>
      <p>f
a d
an re ir g en
a a va to itn</p>
      <p>m
M ) : s u</p>
      <p>S d e te co
: P te v
2 C n it y d</p>
      <p>e c it n
e e il u
gn .se cu b it ie</p>
      <p>m j b s
le li o a if
l i o p t
a d r</p>
      <p>m n u m en
h a u O co id
C f (
rva ,ts ya : le s</p>
      <p>e l t
m v a n
:3 em se it ch ia</p>
      <p>t c r
e s r e t a
g sy tu j n v
en f ce bo em fo
ll o it e p
a e h ru lp u</p>
      <p>o
h yp rc
C t a O im rg
sed tsc lga rsd op h g d la
ttehh .n l-eadB sepgA -rrgeeV .)aTow rskohW rscaeeR iirgeenn rchana irscyehP
i e o in n 7 n e b
w re M re ir 1 aepn iree seR yC
, g sa ien Sp (20 RU
le d d g .H EC ro th n fo
c n ra En om , Eu nd o t
cy a Tow rea fr ew .g l“ sa ap en</p>
      <p>e lu in a
svepO libnu ..)(1902 .ftsSow itrveeed 68780 gaehnV irgeenn rsPpoo ftsySem oadRm eanagm
eD red ,reM -tsyem .tnR l-a402 ,,.C&amp; se ilcyPo tsseom reoanp ndaM
iftttrsaeeehpnnoo lillssccaaeebppphoo frsceeeen li,,.]aeeboCB&amp;mmmmWilf-rrsscvyySeopbhaPCO iltsveeeooonnuupCDm ilii..::ftttrr///ssaaehphnh illi,,,,..JrsySaaaeePndRD lil-tsssyaeeeedbdomm i,,.scee–2019424429dng l,...()SgEe012332nD ilf-rrscyyySaaeednbphoC .Irss"TEeodaaundw iiiitrveeEoonanngnnng .fttssssySeeomm
R a R [1 eD fo ebw []2 ga roP ][3 gA en In yS</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S.</given-names>
            <surname>Engel</surname>
          </string-name>
          ,
          <year>D3</year>
          .2 Policy Proposal “
          <article-title>European Research Agenda for Cyber-physical Systems of Systems and their engineering needs"</article-title>
          ,
          <source>Technical Report</source>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>B.</given-names>
            <surname>Combemale</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Wimmer</surname>
          </string-name>
          ,
          <article-title>Towards a Model-Based DevOps for Cyber-Physical Systems</article-title>
          .
          <source>Software Engineering Aspects of Continuous Development</source>
          ,
          <source>Technical Report</source>
          ,
          <year>2019</year>
          . URL: https://hal.inria.fr/hal-02407886.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A.</given-names>
            <surname>Fuller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Fan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Day</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Barlow</surname>
          </string-name>
          , Digital Twin: Enabling Technology,
          <source>Challenges and Open Research</source>
          ,
          <year>2019</year>
          . arXiv:
          <year>1911</year>
          .01276.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>X.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <article-title>Dynamic data driven simulation, SCS M&amp;S Magazine 5 (</article-title>
          <year>2011</year>
          )
          <fpage>16</fpage>
          -
          <lpage>22</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>R.</given-names>
            <surname>Medhat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Bonakdarpour</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Fischmeister</surname>
          </string-name>
          ,
          <article-title>Runtime monitoring of cyberphysical systems under timing and memory constraints</article-title>
          ,
          <source>ACM Transactions on Embedded Computing Systems</source>
          <volume>14</volume>
          (
          <year>2015</year>
          ). doi:
          <volume>10</volume>
          .1145/2744196.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>J.</given-names>
            <surname>Denil</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Kashif</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Arafa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Vangheluwe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Fischmeister</surname>
          </string-name>
          ,
          <article-title>Instrumentation and preservation of extra-functional properties of simulink models</article-title>
          ,
          <source>in: Proceedings of the Symposium on Theory of Modeling</source>
          &amp; Simulation
          <string-name>
            <surname>: DEVS Integrative M&amp;S Symposium</surname>
          </string-name>
          , Society for Computer Simulation International,
          <year>2015</year>
          , pp.
          <fpage>47</fpage>
          -
          <lpage>54</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Nolan</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. J. McGrath</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Spoczynski</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Healy</surname>
          </string-name>
          ,
          <article-title>Adaptive industrial IOT/CPS messaging strategies for improved edge compute utility</article-title>
          , in: P. Pop, K.-E. Årzén (Eds.),
          <source>Proceedings of the Workshop on Fog Computing and the IoT</source>
          , IoT-Fog@
          <source>IoTDI</source>
          <year>2019</year>
          , Montreal, QC, Canada, April
          <volume>15</volume>
          ,
          <year>2019</year>
          , ACM,
          <year>2019</year>
          , pp.
          <fpage>16</fpage>
          -
          <lpage>20</lpage>
          . doi:
          <volume>10</volume>
          .1145/3313150.3313220.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.</given-names>
            <surname>Berezovskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Inam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>El-Khoury</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Törngren</surname>
          </string-name>
          , E. Fersman,
          <string-name>
            <given-names>R.</given-names>
            <surname>Inam</surname>
          </string-name>
          ,
          <article-title>Eficient State Update Exchange in a CPS Environment for Linked Data-based Digital Twins EEcient State Update Exchange in a CPS Environment for Linked Data-based Digital Twins</article-title>
          ,
          <source>Technical Report</source>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>R.</given-names>
            <surname>Jongeling</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Carlson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Cicchetti</surname>
          </string-name>
          ,
          <article-title>Impediments to Introducing Continuous Integration for Model-Based Development in Industry</article-title>
          ,
          <source>in: Euromicro Conference on Software Engineering and Advanced Applications</source>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>J.</given-names>
            <surname>Engblom</surname>
          </string-name>
          ,
          <article-title>Continuous integration for embedded systems using simulation</article-title>
          ,
          <source>in: Embedded World 2015 Congress</source>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>F.</given-names>
            <surname>Warg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Blom</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Borg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Johansson</surname>
          </string-name>
          ,
          <article-title>Continuous Deployment for Dependable Systems with Continuous Assurance Cases</article-title>
          , in: 2019
          <source>IEEE International Symposium on Software Reliability Engineering</source>
          , WoSoCer workshop, IEEE Computer Society,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>H.</given-names>
            <surname>Vangheluwe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Lara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Mosterman</surname>
          </string-name>
          ,
          <article-title>An introduction to multi-paradigm modelling and simulation</article-title>
          ,
          <source>Proceedings of the AIS'2002 Conference</source>
          (
          <year>2002</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>J.</given-names>
            <surname>Mertens</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Challenger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Vanherpen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Denil</surname>
          </string-name>
          ,
          <article-title>Towards real-time cyber-physical systems instrumentation for creating digital twins</article-title>
          ,
          <source>in: Proceedings of the 2020 Spring Simulation Conference, SpringSim '20</source>
          ,
          <string-name>
            <surname>Society</surname>
          </string-name>
          for Computer Simulation International, San Diego, CA, USA,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>