Page 1 of 1.
Deep learning methods are used in many application areas and work very efficiently after a training phase. However, in general no reliable
statement …
Modern sea as well as domestic ports are more and more controlled by IT-systems. Each of the players involved in port operations (like terminal …
The aim of the project is to develop techniques to elicit requirements for systems to control autonomous vehicles, and validate them in a timely …
The project aims at the development and implementation of appropriate security policies and mechanisms that allow one to incrementally integrate …
MORES2 aims at the development of appropriate refinement techniques for workflow specifications. In particular, the notion of refinement to be …
Spreadsheets have become very popular to analyze and visualize business and science data, so their complexity and impact increased dramatically over …
The project MoReS aims at the transfer and enhancement of existing information-flow control techniques for the development of secure systems using …
Cloud computing is a key component in the future of IT infrastructure in organizations. Typically, however, not all components of IT infrastructure …
For many serious diseases, clinical practice guidelines (CPGs) providing detailed advice on diagnostics and treatment are today being made available …
SHIP aims at utilizing, extending, and adapting semantic modelling, analysis and verification technologies to design, simulate, implement and adapt …
FormalSafe aims at the computer-supported management of the many and diverse
documents produced during the development of highly dependable systems, …