Cyber-Physical Systems: A New Frontier

  • Lui Sha
  • Sathish Gopalakrishnan
  • Xue Liu
  • Qixin Wang

The report of the President's Council of Advisors on Science and Technology (PCAST) has placed cyber-physical systems on the top of the priority list for federal research investment in the United States of America in 2008. This article reviews some of the challenges and promises of cyber-physical systems.


Stream Data Mining Privacy Preserve Data Mining Programming Abstraction Related Chronic Disease Flight Guidance System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
  2. [2]
    NSF Workshops on Cyber Physical Systems.
  3. [3]
    FDA, Draft Guidance for Industry and FDA Staff - Radio-Frequency Wireless Technology in Medical Devices, Jan. 2007.
  4. [4]
    Mu Sun, Qixin Wang, and Lui Sha, “Building Reliable MD PnP Systems”, Proceedings of the Joint Workshop on High Confidence Medical Devices, Software, and Systems and Medical Device Plug-and-Play Interoperability, Jun. 2007.Google Scholar
  5. [5]
    Qixin Wang, et al., “I-Living: An open system architecture for assisted living,” Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Oct. 2006, pp. 4268-4275.Google Scholar
  6. [6]
  7. [7]
    Insup Lee, et al., High-confidence medical device software and systems.
  8. [8]
  9. [9]
    Phillip M. Wells, Koushik Chakraborty, and Gurindar S. Sohi, “Adapting to intermittent faults in future multicore systems,” Proceedings of the International Conference on Parallel Architectures and Compilation Techniques, Sept. 2007.Google Scholar
  10. [10]
    Jaideep Vaidya and Chris Clifton. “Privacy-preserving data mining”, IEEE Security & Privacy Magazine, Vol. 2, No. 6, Nov.-Dec. 2004, pp. 19 - 26.CrossRefGoogle Scholar
  11. [11]
    Jane W.-S. Liu, , “Imprecise computations”, Proceedings of the IEEE, Vol. 82, No. 1, Jan. 1994, pp. 83 - 94.CrossRefGoogle Scholar
  12. [12]
    “Health informatics - Point-of-care medical device communication - Part 10101: Nomenclature,” ISO/IEEE 11073-10101, First Edition, Dec. 15, 2004.Google Scholar
  13. [13]
    Jungkeun Yoon, Brian D. Noble, Mingyan Liu, Minkyong Kim. “Building realistic mobility models from coarse-grained traces,” In Proceedings of the 4th Annual ACM/USENIX Conference on Mobile Systems Applications, and Services. June 2006.Google Scholar
  14. [14]
    Vassilios S. Verykios, Elisa Bertino, Igor Nai Fovino, Loredana Parasiliti Provenza, Yucel Saygin, Yannis Theodoridis, “State-of-the-Art in Privacy Preserving Data Mining,” ACM SIGMOD Record, vol. 3, no. 1, pp. 50-57, Mar. 2004.CrossRefGoogle Scholar
  15. [15]
    Wenbo He, Xue Liu, Hoang Nguyen, Klara Nahrstedt, Tarek Abdelzaher, “PDA: Privacy-preserving Data Aggregation in Wireless Sensor Networks,” in Proceedings of the 26th Annual IEEE Conference on Computer Communications (INFOCOM 2007), Anchorage, Alaska, 2007.Google Scholar
  16. [16]
    Lui Sha, “Using Simplicity to Control Complexity,” IEEE Software, Vol. 18, No. 4, pp. 20-28, July/August 2001.CrossRefGoogle Scholar
  17. [17]
    Lui Sha, Ragunathan Rajkumar, John Lehoczky, “Priority Inheritance Protocols: An Approach to Real-Time Synchronization,” IEEE Transaction on Computers, Vol. 39, No. 9, pp. 1175-1185, September 1990.CrossRefGoogle Scholar
  18. [18]

Copyright information

© Springer-Verlag US 2009

Authors and Affiliations

  • Lui Sha
    • 1
  • Sathish Gopalakrishnan
    • 2
  • Xue Liu
    • 3
  • Qixin Wang
    • 1
  1. 1.University of Illinois at Urbana Champaign
  2. 2.University of British Columbia
  3. 3.Chairman and CEO of United Technology CorporationUniversity of British Columbia

Personalised recommendations