Ulrich Kühne

ORCID: 0000-0002-0855-8223
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Formal Methods in Verification
  • Software Testing and Debugging Techniques
  • VLSI and Analog Circuit Testing
  • Embedded Systems Design Techniques
  • Model-Driven Software Engineering Techniques
  • Radiation Effects in Electronics
  • Dermatologic Treatments and Research
  • Facial Rejuvenation and Surgery Techniques
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Advanced Malware Detection Techniques
  • Software Reliability and Analysis Research
  • Security and Verification in Computing
  • Safety Systems Engineering in Autonomy
  • Petri Nets in System Modeling
  • Botulinum Toxin and Related Neurological Disorders
  • Information and Cyber Security
  • Diverse Legal and Medical Studies
  • Adversarial Robustness in Machine Learning
  • Advanced Software Engineering Methodologies
  • Software Engineering Research
  • Artificial Intelligence in Healthcare and Education
  • Flexible and Reconfigurable Manufacturing Systems
  • Medical and Health Sciences Research
  • Interconnection Networks and Systems
  • Body Contouring and Surgery

Télécom Paris
2018-2022

Messer (Germany)
2014-2021

Laboratoire Traitement et Communication de l’Information
2018-2021

Université Paris-Saclay
2018

Leipzig/Halle Airport
2012-2018

University of Bremen
2006-2016

École Normale Supérieure Paris-Saclay
2011-2015

École Normale Supérieure
2015

Staats- und Universitätsbibliothek Bremen
2013

Centre National de la Recherche Scientifique
2011

Formal verification utilizing symbolic computer algebra has demonstrated the ability to formally verify large Galois field arithmetic circuits and basic architectures of integer circuits.The technique models circuit as Gröbner basis polynomials reduces polynomial equation specification wrt. model.However, during reduction, suffers from exponential blow-up in size polynomials, if it is applied on parallel adders recoded multipliers.In this paper, we address reasons present an approach that...

10.3850/9783981537079_0248 article EN 2016-01-01

This paper documents how an ethically aligned co-design methodology ensures trustworthiness in the early design phase of artificial intelligence (AI) system component for healthcare. The explains decisions made by deep learning networks analyzing images skin lesions. trustworthy AI developed here used a holistic approach rather than static ethical checklist and required multidisciplinary team experts working with designers their managers. Ethical, legal, technical issues potentially arising...

10.3389/fhumd.2021.688152 article EN cc-by Frontiers in Human Dynamics 2021-07-13

Artificial Intelligence (AI) has the potential to greatly improve delivery of healthcare and other services that advance population health wellbeing. However, use AI in also brings risks may cause unintended harm. To guide future developments AI, High-Level Expert Group on set up by European Commission (EC), recently published ethics guidelines for what it terms “trustworthy” AI. These are aimed at a variety stakeholders, especially guiding practitioners toward more ethical robust...

10.3389/fhumd.2021.673104 article EN cc-by Frontiers in Human Dynamics 2021-07-08

This article's main contributions are twofold: 1) to demonstrate how apply the general European Union's High-Level Expert Group's (EU HLEG) guidelines for trustworthy AI in practice domain of healthcare and 2) investigate research question what does "trustworthy AI" mean at time COVID-19 pandemic. To this end, we present results a post-hoc self-assessment evaluate trustworthiness an system predicting multiregional score conveying degree lung compromise patients, developed verified by...

10.1109/tts.2022.3195114 article EN cc-by-nc-nd IEEE Transactions on Technology and Society 2022-07-29

Following the trend in facial cosmetic procedures, patients are now increasingly requesting hand rejuvenation treatments. Intrinsic ageing of hands is characterized by loss dermal elasticity and atrophy subcutaneous tissue. Thus, veins, tendons bony structures become apparent. Among available intrinsic best improved restoring volume soft Volume restoration can be achieved with a number long-lasting fillers varying degrees improvement treatment longevity. The used include autologous fat,...

10.4103/0974-2077.101369 article EN cc-by-nc-sa Journal of Cutaneous and Aesthetic Surgery 2012-01-01

Today, the underlying hardware of embedded systems is often verified successfully. In this context formal verification techniques allow to prove functional correctness. But in system design integration software components becomes more and important. paper we present an integrated approach for software. The demonstrated on a RISC CPU. based bounded model checking. Besides correctness proofs hardware/software interface programs using can be formally verified.

10.1145/1127908.1127920 article EN 2006-04-30

Due to high computational costs of formal verification on pure Boolean level, proof techniques the word like Satisfiability Modulo Theories (SMT), were proposed. Verification methods originally based satisfiability (SAT) can directly benefit from this progress. In work we present level framework WoLFram that enables development applications for systems independent underlying technique. The is partitioned into an application layer, a core engine and back-end layer. A wide range implemented,...

10.1109/rsp.2009.21 article EN 2009-06-01

<para xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> Formal verification is an important issue in circuit and system design. In this context, bounded model checking (BMC) one of the most successful techniques. However, even if all specified properties can be verified, it difficult to determine whether they cover complete functional behavior a We propose practical approach analyze coverage BMC. The easily integrated BMC tool with only minor changes....

10.1109/tcad.2008.925790 article EN IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2008-06-16

Equivalence checking and property are powerful techniques to detect error traces. Debugging these traces is a time consuming design task where automation provides help. In particular, debugging based on Boolean Satisfiability (SAT) has been shown be quite efficient. Given some traces, the algorithm returns fault candidates. But using random cannot ensure that candidate sufficient explain all erroneous behaviors. Our approach more accurate diagnosis by iterating generation of counterexamples...

10.5555/1874620.1874940 article EN 2009-04-20

The complexity of today's embedded and cyber-physical systems is rapidly increasing makes the consideration higher levels abstraction during design process inevitable. In this context, impact modeling languages such as UML its profiles MARTE growing. Here, CCSL provides a formal description timing constraints which have to be enforced on considered system. This builds basis for many further steps can used e. g. checking consistency specification, code generation, or proving whether time...

10.1145/2744769.2744775 article EN 2015-06-02

Equivalence checking and property are powerful techniques to detect error traces. Debugging these traces is a time consuming design task where automation provides help. In particular, debugging based on Boolean satisfiability (SAT) has been shown be quite efficient. Given some traces, the algorithm returns fault candidates. But using random cannot ensure that candidate sufficient explain all erroneous behaviors. Our approach more accurate diagnosis by iterating generation of counterexamples...

10.1109/date.2009.5090870 preprint EN 2009-04-01

Formal verification is an important issue in circuit and system design. In this context, Bounded Model Checking (BMC) one of the most successful techniques. But even if all specified properties can be verified, it difficult to determine whether they cover complete functional behavior a We propose pragmatic approach estimate coverage BMC. The easily integrated BMC tool with only minor changes. our approach, property generated for each signal. If considered do not describe signal's entire...

10.5555/1266366.1266620 article EN Design, Automation, and Test in Europe 2007-04-16

The application of built-to-order embedded hardware designs in safety critical systems requires a high design quality and robustness during operation. Flawless execution the involved software can be compromised by malfunctioning components or software-induced errors. Furthermore, intellectual property (IP) tends to become unavoidable modern designs. Any unexpected behavior IP may cause unrecoverable system In order construct correct safe from unverified potentially malicious components, we...

10.1109/rsp.2015.7416550 article EN 2015-10-01

Cohesive polydensified matrix (CPM®) hyaluronic acid fillers are now available with or without lidocaine. The aim of this study was to investigate the safety and performance CPM® lidocaine in clinical setting. In an open-label, prospective, postmarketing study, 108 patients from seven sites Germany Denmark were treated one more lidocaine-containing fillers. Performance assessed using Merz Aesthetics Scales® (MAS). Pain rated on 11-point visual analog scale. Patients' physicians' satisfaction...

10.2147/ccid.s115256 article EN cc-by-nc Clinical Cosmetic and Investigational Dermatology 2016-10-01

Formal verification is an important issue in circuit and system design. In this context, bounded model checking (BMC) one of the most successful techniques. But even if all specified properties can be verified, it difficult to determine whether they cover complete functional behavior a We propose pragmatic approach estimate coverage BMC. The easily integrated BMC tool with only minor changes. our approach, property generated for each signal. If considered do not describe signal's entire...

10.1109/date.2007.364454 article EN 2007-04-01

In this paper we present a hardware based solution to verify simultaneously Code and Control-Flow Integrity (CCFI), aiming at protecting microcontrollers against both cyber-and physical attacks. This is non-intrusive as it does not require any modification of the CPU core. It relies on two additional blocks external CPU: The first one – called CCFI-cache acts dedicated cache for storage information check code control-flow integrity, second CCFI-checker performs integrity verification. Based...

10.1109/dsd.2018.00093 article EN 2018-08-01

To keep up with the growing complexity of digital systems, high level models are used in design process. In today's processor design, a comprehensive tool chain can be built automatically from architectural or transaction models, but disregarding formal verification. We present an approach to generate complete property suite architecture description, that formally verify register transfer (RTL) implementation processor. The is by construction, i.e. exhaustive verification all functionality...

10.5555/1998496.1998521 article EN 2010-10-20

Today for System-on-Chips (SoCs) companies Electronic System Level(ESL) design is the established approach. Abstraction and standardized communication interfaces based on SystemC Transaction Level Modeling (TLM) have become core component ESL design. The abstract models in flows are stepwise refined down to hardware. In this context verification major bottleneck: After each refinement step resulting model simulated again with same testbench. simulation results be compared previous check...

10.1145/1973009.1973054 article EN 2011-05-02
Coming Soon ...