Tim Gonschorek

Tim Gonschorek
Otto-von-Guericke-Universität Magdeburg | OvGU · Department of Intelligent Cooperating Systems

Master of Science

About

21
Publications
3,840
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
39
Citations
Citations since 2017
19 Research Items
39 Citations
2017201820192020202120222023024681012
2017201820192020202120222023024681012
2017201820192020202120222023024681012
2017201820192020202120222023024681012
Additional affiliations
April 2015 - September 2017
Otto-von-Guericke-Universität Magdeburg
Position
  • Research Assistant

Publications

Publications (21)
Conference Paper
Full-text available
This paper presents a new approach for generating probability distributions for Monte Carlo based stochastic model checking. Stochastic approaches are used for quantitative analysis of safety critical systems if numerical model checking tools get overwhelmed by the complexity of the models and the exploding state space. However, sample based stocha...
Conference Paper
Full-text available
When dealing with structural safety analysis, one of the most popular methodologies is Fault Tree Analysis (FTA). However, one major critique is the rapid increase of the complexity, and therefore incomprehensibility, when dealing with realistic systems. One approach to overcome this are Component Fault Trees (CFT), presenting an extension to stand...
Chapter
Full-text available
The safety design definition of a safety critical system is a complex task. On the one hand, the system designer must ensure that he addressed all potentially hazardous harwdware faults. This is often defined not(!) in the model but within extra documents (e.g., Excel sheets). On the other hand, all defined safety mechanisms must be transformed bac...
Preprint
Full-text available
Deep Neural Networks for classification behave unpredictably when confronted with inputs not stemming from the training distribution. This motivates out-of-distribution detection (OOD) mechanisms. The usual lack of prior information on out-of-distribution data renders the performance estimation of detection approaches on unseen data difficult. Seve...
Conference Paper
The acquisition of datasets is typically a laborious task. It is challenging, especially if the required annotations in every image in the dataset are vast. It is even more challenging if the inter-class variance, the visual difference between two distinct classes, is low. Retail product recognition constitutes an example of both issues. Products a...
Article
Full-text available
The healthcare industry is consistently developing a constant supply of medical equipment, e.g. radiation protection wear. These must be inspected regularly to ensure safety and quality. As this equipment keeps on moving from department to department, it has to be located in one place for annual inspection and must be properly documented after qual...
Preprint
Full-text available
One of the key benefits of model predictive control is the capability of controlling a system proactively in the sense of taking the future system evolution into account. However, often external disturbances or references are not a priori known, which renders the predictive controllers shortsighted or uninformed. Adaptive prediction models can be u...
Chapter
Full-text available
Applying a safety artifact language as Safety Design Modeling Language SafeDeML integrates the generation of the safety design into the system modeling stage – directly within the system architecture. In this paper, we present a modeling process and a prototype for the CASE tool Enterprise Architect for SafeDeML. The goal is to support the system d...
Conference Paper
Full-text available
The theoretic foundations for formally verifying railway interlocking systems have already been studied extensively. There exist a lot of work covering the application of methodologies like model checking in this context. However, some design faults still remain undetected until final on-track evaluation of the system. This is strongly related to m...
Poster
Full-text available
The poster presents the tool-chain VECS implementing a structured process for integrating formal verification methods within the safety-development life-cycle for software intensive critical systems.
Conference Paper
Full-text available
Proving the safety of a critical system is a complex and complicated task. Model-based formal verification techniques can help to verify a System Requirement Specification (SRS) with respect to normative and safety requirements. Due to an early application of these methods, it is possible to reduce the risk of high costs caused by unexpected, late...
Conference Paper
Full-text available
Feature matching is one of the fundamental issues in computer vision. The established methods, however, do not provide reliable results, especially for extreme viewpoint changes. Different approaches have been proposed to lower this hurdle, e. g., by randomly sampling different viewpoints to obtain better results. However, these methods are computa...
Conference Paper
Full-text available
In recent years, formal methods have become an important approach to ensure the correct function of complex hardware and software systems. Many standards for safety critical systems recommend or even require the use of formal methods. However, building a formal model for a given specification is challenging. This is, because verification results mu...
Article
Full-text available
Nowadays, model checking approaches have one major drawback: They suffer from the state space explosion problem. We think one major problem is that the verification tools always must hold some (symbolic) representation, e.g. a BDD or a adjacency list, in the memory during the verification process. In this paper we propose a verification approach th...

Network

Cited By