Results 101 to 110 of about 214,245 (305)
Este estudo tem como objetivo avaliar a fidedignidade da Escala de Condutas Anti-sociais e Delitivas ou Delinqüente (Seidedos, 1988) para outros contextos brasileiros, a partir de um parâmetro psicométrico, o Alpha de Cronbach.
Nilton Soares Formiga
doaj +1 more source
Empirical evaluation of accuracy of mathematical software used for availability assessment of fault-tolerant computer systems [PDF]
Dependability assessment is typically based on complex probabilistic models. Markov and semi-Markov models are widely used to model dependability of complex hardware/software architectures.
Kharchenko, V. S. +3 more
core
Targeted modulation of IGFL2‐AS1 reveals its translational potential in cervical adenocarcinoma
Cervical adenocarcinoma patients face worse outcomes than squamous cell carcinoma counterparts despite similar treatment. The identification of IGFL2‐AS1's differential expression provides a molecular basis for distinguishing these histotypes, paving the way for personalized therapies and improved survival in vulnerable populations globally.
Ricardo Cesar Cintra +6 more
wiley +1 more source
This paper proposes an integrated ontological framework, Integrated Systems Ontology (ISOnto), for dependable systems engineering by semantically linking design models with real-world operational failure data. Building upon the recently proposed Function–
Haytham Younus +4 more
doaj +1 more source
Dependability and Survivability Evaluation of a Water Distribution Process with Arcade [PDF]
Among others, drinking water belongs to the socalled critical infrastructures. To ensure that the water production meets current and future societal needs, a systematic and rigorous analysis is needed.
Remke, Anne +2 more
core +2 more sources
Pre‐analytical handling critically determines liquid biopsy performance. This study defines practical best‐practice conditions for cell‐free DNA (cfDNA) and extracellular vesicle–derived DNA (evDNA), showing how processing time, storage conditions, tube type, and plasma input volume affect DNA integrity and mutation detection.
Jonas Dohmen +11 more
wiley +1 more source
Application progress of SGX in trusted computing area
The trusted computing technology SGX protects the confidentiality and integrity of key codes and data by isolating a trusted execution environment, which can help prevent all kinds of attacks.Firstly, the research background and working principle of SGX ...
Bo ZHAO, Anqi YUAN, Yang AN
doaj
Argument Representation for Dependable Computer-Based Systems
Society is becoming increasingly reliant upon the dependability of computerbased systems. Achieving and demonstrating the dependability of systems requires the construction and review of valid and coherent arguments.
C. Gurr
doaj +1 more source
Glioma cells mainly express the endothelin receptor EDNRB, while EDNRA is restricted to a perivascular tumor subpopulation. Endothelin signaling reduces glioma cell proliferation while promoting migration and a proneural‐to‐mesenchymal transition associated with poor prognosis. This pathway activates Ca2+, K+, ERK, and STAT3 signalings and is regulated
Donovan Pineau +36 more
wiley +1 more source
Somatic mutational landscape in von Hippel–Lindau familial hemangioblastoma
The causes of central nervous system (CNS) hemangioblastoma in Von Hippel–Lindau (vHL) disease are unclear. We used Whole Exome Sequencing (WES) on familial hemangioblastoma to investigate events that underlie tumor development. Our findings suggest that VHL loss creates a permissive environment for tumor formation, while additional alterations ...
Maja Dembic +5 more
wiley +1 more source

