- Advanced Software Engineering Methodologies
- Service-Oriented Architecture and Web Services
- Software System Performance and Reliability
- Formal Methods in Verification
- Distributed and Parallel Computing Systems
- Business Process Modeling and Analysis
- Model-Driven Software Engineering Techniques
- Software Engineering Techniques and Practices
- Software Engineering Research
- Software Reliability and Analysis Research
- Scientific Computing and Data Management
- Real-Time Systems Scheduling
- Distributed systems and fault tolerance
- Economic and Social Issues
- Cloud Computing and Resource Management
- Embedded Systems Design Techniques
- Software Testing and Debugging Techniques
- Semantic Web and Ontologies
- Petri Nets in System Modeling
- Simulation Techniques and Applications
- Web Data Mining and Analysis
- Natural Language Processing Techniques
- Algorithms and Data Compression
- Logic, programming, and type systems
- Data Management and Algorithms
Ludwig-Maximilians-Universität München
2022-2025
LMU Klinikum
2022-2025
RMIT University
2011-2021
MIT University
2008-2019
Heidelberg University
2015
Norwegian University of Science and Technology
2014
Boehringer Ingelheim (Germany)
2014
Software (Spain)
2014
Karlsruhe Institute of Technology
2014
Endress Hauser Messtechnik (Germany)
2011
We aimed to create a prognostic model in metastatic melanoma based on independent factors 321 patients receiving interleukin-2 (IL-2)-based immunotherapy with median follow-up time for currently alive of 52 months (range 15–189 months). The were treated as part several phase II protocols and the majority received treatment intermediate dose subcutaneous IL-2 interferon-α. Neutrophil monocyte counts, lactate dehydrogenase (LDH), number sites, location metastases performance status all...
Two human pathogenic bacteria, Staphylococcus aureus CIP 68.5 and Pseudomonas aeruginosa ATCC 9025, were adsorbed onto surfaces containing Ti thin films of varying thickness to determine the extent which nanoscale surface roughness influences bacterial attachment. A magnetron sputter film system was used deposit titanium with thicknesses 3, 12, 150 nm on glass substrata corresponding parameters R(q) 1.6, 1.2, 0.7 (on a 4 microm x scanning area). The chemical composition, wettability,...
Time management in workflow processes is crucial determining and controlling the life cycle of business activities. In our model, a temporal interval as an execution duration assigned to every task. While real time taken by task nondeterministic unpredictable, it may be between bounds thus specified. We extend nets (WF-nets) with intervals call new WF-nets (TWF-nets). Extending previous results on timed Petri nets, we show that certain behavioural properties modelled TWF-nets can verified....
Classic congenital adrenal hyperplasia due to 21-hydroxylase deficiency (CAH) requires lifelong glucocorticoid replacement manage cortisol and excessive androgen production. Conventional circadian treatment (CT) tries mimic natural rhythms, whereas reverse-circadian (RC) prioritizes the suppression of excess overnight through evening dosing. Limited data exist on immunological impact these regimens. A bi-centric study was conducted, including 41 pediatric adolescent CAH patients. Peripheral...
Cyber-physical Systems (CPS) combine human-machine interaction, the physical world around us, and software aspects by integrating systems with communication networks. Opportunities research challenges are largely interconnected three core sub-domains of CPS — computation, control. The current state art legacy technology is one major hindrances limiting evolution CPS. Most specifically, innovation in restricted existing routing switching technologies leaving no practical methods for...
Trends such as the Industrial Internet of Things and Industry 4.0 have increased need to use new innovative network technologies in industrial automation. The growth automation communications is an outcome shift harness productivity efficiency manufacturing process with a minimum human intervention. Due ongoing evolution networks from Fieldbus Ethernet, opportunity has emerged benefits Software Defined Networking (SDN). In this paper, we provide brief overview SDN domain propose architecture...
From smart buildings to medical devices nations, software systems increasingly integrate computation, networking, and interaction with the physical environment. These are known as Cyber-Physical Systems (CPS). While these open new opportunities deliver improved quality of life for people reinvigorate computing, their engineering is a difficult problem given level heterogeneity dynamism they exhibit. progress has been made, we argue that complexity now at such existing approaches need major...
Abstract Objective Patients with congenital adrenal hyperplasia (CAH) require life-long glucocorticoid replacement, including stress dosing (SD). This study prospectively assessed crisis (AC) incidence, frequency, and details of SD disease knowledge in adult paediatric patients their parents. Design Prospective, observational study. Methods Data on AC were collected via a patient diary. In case AC, medical records reviewed interviews conducted. Adherence to sick day rules the German Society...
The software industry stands on feet of clay. However carefully we may strive to build correct and reliable software, have no way guaranteeing the quality result. Building depends so much else, from hardware operating system compiler runtime libraries. And any significant has many details components its own that can hardly expect get everything right if do it all by ourselves. We describe an ambitious but realistic project combines ideas reuse formality with other more pragmatic techniques....
In this paper we introduce the MatchDetectReveal(MDR) system, which is capable of identifying overlapping and plagiarised documents. Each component system briefly described. The matching-engine uses a modified suffix tree representation, able to identify exact chunks its performance also presented.
Enterprise Architecture deals with the structure of an enterprise, relationships and interactions its units. It provides a holistic approach to reconcile IT Business concerns in enterprise. Virtual Enterprises are collaborative ad-hoc alliances multiple enterprises for specific business opportunity. This paper looks into both paradigms viewpoint Enterprise. Service Oriented as style proves be enabler at Technology Levels. The three major challenges flexibility, adaptability, agility....
A method preserving cyber-physical systems to operate safely in a joint physical space is presented. It comprises the model-based development of control software and simulators for continuous environment as well proving models spatial real-time properties. The corresponding toolchain based on engineering tool Reactive Blocks model checker BeSpaceD. constraints be kept by controller are proven using UPPAAL.
Easy access to the Web has led increased potential for students cheating on assignments by plagiarising others' work. By same token, Web-based tools offer instructors check submitted signs of plagiarism. Overlap-detection are easy use and accurate in plagiarism detection, so they can be an excellent deterrent Documents overlap other reasons, too: Old documents superseded, authors summarize previous work identically several papers. pinpoint interconnections a corpus could used search...
Because of computational grid heterogeneity, scale and complexity, faults become likely. Therefore, infrastructure must have mechanisms to deal with while also providing efficient reliable services its end users. Existing fault-tolerant approaches are inefficient because they reactive incomplete. They only when take place; incomplete certain types faults. Proactive increase efficiency by reducing the cost time operations network resource usage maintaining state executing applications...
We present a contract-based technique to achieve reuse of known worst-case execution times (WCET) in conjunction with software components. For resource constrained systems, or systems where high degree predictability is needed, classical techniques for WCET- estimation will result unacceptable overestimation the execution-time reusable components rich behavior. Our allows different WCETs be associated subsets component The appropriate WCET any usage context selected means contracts over...
In this report, we present work towards a framework for modeling and checking behavior of spatially distributed component systems. Design goals our are the ability to model spatial in oriented, simple intuitive way, possibility automatically analyse verify systems integration possibilities with other verification tools. We examples steps necessary prove properties such as range coverage or absence collisions between components technical details.