Results 81 to 90 of about 1,549,240 (292)
Synthesizing Short-Circuiting Validation of Data Structure Invariants
This paper presents incremental verification-validation, a novel approach for checking rich data structure invariants expressed as separation logic assertions. Incremental verification-validation combines static verification of separation properties with
Chang, Bor-Yuh Evan +3 more
core +1 more source
ABSTRACT Bone tumours present significant challenges for affected patients, as multimodal therapy often leads to prolonged physical limitations. This is particularly critical during childhood and adolescence, as it can negatively impact physiological development and psychosocial resilience.
Jennifer Queisser +5 more
wiley +1 more source
LiDAR Data Integrity Verification for Autonomous Vehicle
Deterministic perception of the surrounding environment is both crucial and a challenging task for autonomous vehicles. A wide range of sensors, including LiDAR, RADAR, cameras, and so on, are used to build the perception layer of an autonomous vehicle ...
Raghu Changalvala, Hafiz Malik
doaj +1 more source
ABSTRACT Background The delipid extracorporeal lipoprotein filter from plasma (DELP) treatment can effectively reduce blood lipid, increase blood flow, and improve neurological deficits in patients with acute ischemic stroke (AIS). However, its effect on vision and retinal microcirculation in stroke patients has never been reported.
Ning Li +9 more
wiley +1 more source
ABSTRACT Background Chronic kidney disease is a growing public health problem worldwide, and the number of patients requiring renal replacement therapy is steadily increasing. Türkiye has experienced a similar rise in both the incidence and prevalence of renal replacement therapy over the past decades; however, national‐level projections of future ...
Arzu Akgül +2 more
wiley +1 more source
Provable data possession scheme based on public verification and private verification
More and more users choose to transfer their applications and data into the cloud.Data security is a key issue for cloud storage systems.To ensure the integrity and validity of the data stored in the cloud,provable data possession (PDP) scheme is ...
Junfeng TIAN, Mengjia CHAI, Liuling QI
doaj +2 more sources
A Three-Pronged Verification Approach to Higher-Level Verification Using Graph Data Structures
Individual model verification is a common practice that increases the quality of design on the left side of the Vee model, often before costly builds and prototypes are implemented.
Daniel Dunbar +3 more
doaj +1 more source
ABSTRACT Introduction Patients with ovarian cancer often present with massive ascites, leading to significant protein loss during surgical procedures. Although cell‐free concentrated ascites reinfusion therapy (CART) is used in palliative settings to mitigate protein loss, its application in intraoperative settings remains unexplored.
Yutaka Yoneoka +7 more
wiley +1 more source
International database of reference gamma spectra for nuclear safeguards applications
Nuclear safeguards missions use gamma spectroscopy as a non-destructive measurement technique for examining nuclear materials. Despite advances in the development of detection equipment as well as software codes, one of the concerns is the lack of well ...
Dipti +9 more
doaj +1 more source
Data intensive applications verification
The main challenges for a Data-Intensive Application are the data quantity, the data complexity and the speed at which the data changes. For these applications, there are two predominant data categories, Master Data and Transactional Data. Master Data represents the data that is not frequently modified and that is required for the system to operate ...
openaire +2 more sources

