Florian Schanda

Learn More
Software forms a key component of many modern safety and security critical systems. One approach to achieving the required levels of assurance is to prove that the software is free from bugs and meets its specification. If a proof cannot be constructed it is important to identify the root cause as it may be a flaw in the specification or a bug. Novice users(More)
The structure of (S)-N,N'-di-tert-butyl-2-[N-(1-phenylethyl)benzamido] malonamide contains two fragments of a polypeptide chain. This compound therefore can be taken as a model substance for details of protein conformation. In the crystalline state one peptide chain of the model molecule incorporates a hydrogen bond between two adjacent nitrogen atoms in(More)
PURPOSE We compared the targeting accuracy and reliability of two different electromagnetic navigation systems for manually guided punctures in a phantom. MATERIALS AND METHODS CT data sets of a gelatin filled plexiglass phantom were acquired with 1, 3, and 5 mm slice thickness. After paired-point registration of the phantom, a total of 480 navigated(More)
A common approach to formally checking assertions inserted into a program is to first generate verification conditions, logical sentences that, if then proven, ensure the assertions are correct. Sometimes users provide axioms that get incorporated into verification conditions. Such axioms can capture aspects of the program's specification or can be hints to(More)
We propose and demonstrate a method for the reduction of testing effort in safety-critical software development using DO-178 guidance. We achieve this through the application of Bounded Model Checking (BMC) to formal low-level requirements, in order to generate tests automatically that are good enough to replace existing labor-intensive test writing(More)
  • 1