Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Stephan Arlt"'
Autor:
Stephan Arlt, Hansrudi Noser, Andreas Wienke, Florian Radetzki, Gunther Olaf Hofmann, Thomas Mendel
Publikováno v:
Journal of Orthopaedic Surgery and Research, Vol 13, Iss 1, Pp 1-10 (2018)
Abstract Background Acetabular fracture surgery is directed toward anatomical reduction and stable fixation to allow for the early functional rehabilitation of an injured hip joint. Recent biomechanical investigations have shown the superiority of us
Externí odkaz:
https://doaj.org/article/504e9ef8c1df433eba8b3bc593a10ecd
Autor:
Gunther Olaf Hofmann, Florian Radetzki, Thomas Mendel, Hansrudi Noser, Stephan Arlt, Andreas Wienke
Publikováno v:
Journal of Orthopaedic Surgery and Research
Journal of Orthopaedic Surgery and Research, Vol 13, Iss 1, Pp 1-10 (2018)
Journal of Orthopaedic Surgery and Research, Vol 13, Iss 1, Pp 1-10 (2018)
Background Acetabular fracture surgery is directed toward anatomical reduction and stable fixation to allow for the early functional rehabilitation of an injured hip joint. Recent biomechanical investigations have shown the superiority of using an ad
Autor:
Thomas Braun, Ina Hillebrand, Ursula Müller-Werdan, Sawa Kostin, Ying Zhang, Henning Ebelt, Elisabeth Schwarz, Stephan Arlt, Karl Werdan, Herbert Neuhaus
Publikováno v:
Shock. 39:353-360
Various strategies have been devised to reduce the clinical consequences of myocardial infarction, including acute medical care, revascularization, stem cell transplantations, and more recently, prevention of cardiomyocyte cell death. Activation of e
Publikováno v:
ICST
In this paper we propose an approach that, given a structured requirements specification, allows the automatic online detection of a redundant test case. This means that, at each time point during a testing phase, one automatically infers the failure
Publikováno v:
ISSTA
International Symposium on Software Testing and Analysis, San Jose 21-25 July 2014. (2014).
International Symposium on Software Testing and Analysis, San Jose 21-25 July 2014. (2014).
A crucial problem in GUI testing is the identification of accurate event sequences that encode corresponding user interactions with the GUI. Ultimately, event sequences should be both feasible (i. e., executable on the GUI) and relevant (i.e., cover
Publikováno v:
Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change ISBN: 9783662452332
ISoLA (1)
ISoLA (1)
In this paper, we propose to base the verification of a GUI application on a reference model used in black-box testing. The reference model is a formal model for the behavior of the GUI application. It is derived by dynamic analysis hence "black-box"
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::62dcf3c95861f5eef805a1bfc701aeb5
https://doi.org/10.1007/978-3-662-45234-9_17
https://doi.org/10.1007/978-3-662-45234-9_17
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319061993
NASA Formal Methods
NASA Formal Methods, Houston 29 April-1 May 2014. (2014).
NASA Formal Methods
NASA Formal Methods, Houston 29 April-1 May 2014. (2014).
Static verification traditionally produces yes/no answers. It either provides a proof that a piece of code meets a property, or a counterexample showing that the property can be violated. Hence, the progress of static verification is hard to measure.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::29ee32d1beadfa52f7aebaab5169bb6b
https://doi.org/10.1007/978-3-319-06200-6_27
https://doi.org/10.1007/978-3-319-06200-6_27
Publikováno v:
SOAP@PLDI
Recently, software verification is being used to prove the presence of contradictions in source code, and thus detect potential weaknesses in the code or provide assistance to the compiler optimization. Compared to verification of correctness propert
Publikováno v:
Formal Methods and Software Engineering ISBN: 9783642412011
ICFEM
ICFEM. (2013).
ICFEM
ICFEM. (2013).
Infeasible code has proved to be an interesting target for static analysis. It allows modular and scalable analysis, and at the same time, can be implemented with a close-to-zero rate of false warnings. The challenge for an infeasible code detection
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d498497c086f1ce0ec85f5dcbbd8f433
https://doi.org/10.1007/978-3-642-41202-8_28
https://doi.org/10.1007/978-3-642-41202-8_28
Publikováno v:
Automated Technology for Verification and Analysis ISBN: 9783319024431
ATVA
ATVA. (2013).
ATVA
ATVA. (2013).
Detection of infeasible code has recently been identified as a scalable and automated technique to locate likely defects in software programs. Given the (acyclic) control-flow graph of a procedure, infeasible code detection depends on an exhaustive s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4e27d813d9f708bd1e622d6dff75d05f
https://doi.org/10.1007/978-3-319-02444-8_44
https://doi.org/10.1007/978-3-319-02444-8_44