Zobrazeno 1 - 10
of 27 142
pro vyhledávání: '"Budde"'
Autor:
Cramer Jakob, Dassow Niklas, Böttcher-Rebmann Georg, Budde Leon, Lenarz Thomas, Rau Thomas S.
Publikováno v:
Current Directions in Biomedical Engineering, Vol 9, Iss 1, Pp 130-133 (2023)
In research on cochlear implants, preclinical testing of newly developed electrode arrays and surgical tools is an essential procedure, which requires the availability of a suitable testing environment. For this purpose, human temporal bone specimens
Externí odkaz:
https://doaj.org/article/7e243e00f8dc447abbb6b4ab46361d24
Autor:
Budde Leon, Ihler Sontje, Spindeldreier Svenja, Lücking Tobias, Meyer Tim, Bodenschatz Eberhard, Zimmermann Wolfram-Hubertus
Publikováno v:
Current Directions in Biomedical Engineering, Vol 8, Iss 2, Pp 137-140 (2022)
Motivated by a high demand, the research interest in personalized artificial tissues is steadily increasing. Combining knowledge of additive manufacturing and tissue engineering, the research field of 3D bioprinting emerged. This work presents a six-
Externí odkaz:
https://doaj.org/article/79f02e3000b04717851bbf3868f929c5
Publikováno v:
Current Directions in Biomedical Engineering, Vol 7, Iss 2, Pp 97-100 (2021)
The electrode array insertion is a critical point during CI surgery and should be performed as gently as possible to preserve residual hearing. In order to measure occurring forces, an insertion tool with an integrated force sensor and an inertial me
Externí odkaz:
https://doaj.org/article/a693daab199349928e0e3568c96ffde3
Software security mainly studies vulnerability detection: is my code vulnerable today? This hinders risk estimation, so new approaches are emerging to forecast the occurrence of future vulnerabilities. While useful, these approaches are coarse-graine
Externí odkaz:
http://arxiv.org/abs/2411.11202
Autor:
Budde, Carlos E., Hartmanns, Arnd, Meggendorfer, Tobias, Weininger, Maximilian, Wienhöft, Patrick
Statistical model checking estimates probabilities and expectations of interest in probabilistic system models by using random simulations. Its results come with statistical guarantees. However, many tools use unsound statistical methods that produce
Externí odkaz:
http://arxiv.org/abs/2411.00559
Autor:
Schilling, Kurt G, Howard, Amy FD, Grussu, Francesco, Ianus, Andrada, Hansen, Brian, Barrett, Rachel L C, Aggarwal, Manisha, Michielse, Stijn, Nasrallah, Fatima, Syeda, Warda, Wang, Nian, Veraart, Jelle, Roebroeck, Alard, Bagdasarian, Andrew F, Eichner, Cornelius, Sepehrband, Farshid, Zimmermann, Jan, Soustelle, Lucas, Bowman, Christien, Tendler, Benjamin C, Hertanu, Andreea, Jeurissen, Ben, Verhoye, Marleen, Frydman, Lucio, van de Looij, Yohan, Hike, David, Dunn, Jeff F, Miller, Karla, Landman, Bennett A, Shemesh, Noam, Anderson, Adam, McKinnon, Emilie, Farquharson, Shawna, Acqua, Flavio Dell', Pierpaoli, Carlo, Drobnjak, Ivana, Leemans, Alexander, Harkins, Kevin D, Descoteaux, Maxime, Xu, Duan, Huang, Hao, Santin, Mathieu D, Grant, Samuel C., Obenaus, Andre, Kim, Gene S, Wu, Dan, Bihan, Denis Le, Blackband, Stephen J, Ciobanu, Luisa, Fieremans, Els, Bai, Ruiliang, Leergaard, Trygve B, Zhang, Jiangyang, Dyrby, Tim B, Johnson, G Allan, Cohen-Adad, Julien, Budde, Matthew D, Jelescu, Ileana O
Preclinical diffusion MRI (dMRI) has proven value in methods development and validation, characterizing the biological basis of diffusion phenomena, and comparative anatomy. While dMRI enables in vivo non-invasive characterization of tissue, ex vivo
Externí odkaz:
http://arxiv.org/abs/2411.05021
Autor:
Oss, Tommaso, Budde, Carlos E.
Turing completeness has made Ethereum smart contracts attractive to blockchain developers and attackers alike. To increase code security, many tools can now spot most known vulnerabilities$-$at the cost of production efficiency. Recent studies show f
Externí odkaz:
http://arxiv.org/abs/2410.17204
Autor:
Nicoletti, Stefano M., Lopuhaä-Zwakenberg, Milan, Stoelinga, Mariëlle, Massacci, Fabio, Budde, Carlos E.
The landscape of cyber threats grows more complex by the day. Advanced Persistent Threats carry out systematic attack campaigns against which cybersecurity practitioners must defend. Examples of such organized attacks are operations Dream Job, Wocao,
Externí odkaz:
http://arxiv.org/abs/2410.06692
Anlässlich eines richterlichen Gutachtenauftrages zur Frage, ob das Tragen von Mund-Nase-Schutzmasken zu einer Verfälschung des Atemalkoholmesswertes zuungunsten des Angeklagten führen kann, erfolgte unter Pandemiebedingungen eine experimentelle T
Externí odkaz:
https://tud.qucosa.de/id/qucosa%3A90816
https://tud.qucosa.de/api/qucosa%3A90816/attachment/ATT-0/
https://tud.qucosa.de/api/qucosa%3A90816/attachment/ATT-0/
Autor:
Plage H, Pielka P, Liefeldt L, Budde K, Ebbing J, Sugünes N, Miller K, Cash H, Bichmann A, Sattler A, Kotsch K, Friedersdorff F
Publikováno v:
Therapeutics and Clinical Risk Management, Vol Volume 16, Pp 787-793 (2020)
Henning Plage,1 Poline Pielka,1 Lutz Liefeldt,2 Klemens Budde,2 Jan Ebbing,3 Nesrin Sugünes,1 Kurt Miller,1 Hannes Cash,1 Anna Bichmann,4 Arne Sattler,5 Katja Kotsch,5 Frank Friedersdorff1 1Department of Urology, Charité – Universitätsmedizin Be
Externí odkaz:
https://doaj.org/article/3632a3103efa48f8bd34f6dbe6c5a70a