Results 91 to 100 of about 226,897 (274)

Model evolution and system evolution

open access: yesJournal of Computer Science and Technology, 2000
In this paper we define an evolution mechanism with formal semantics using the metamodeling methodology [Geisler et al.98] based on dynamic logic. A remarkable feature of the metamodeling methodology is the ability to define the relation of intentional ...
Claudia Pons   +2 more
doaj  

Justifications in Constraint Handling Rules for Logical Retraction in Dynamic Algorithms

open access: yes, 2017
We present a straightforward source-to-source transformation that introduces justifications for user-defined constraints into the CHR programming language.
A Wolf   +10 more
core   +1 more source

Conversion of Transplanted Mature Hepatocytes into Afp+ Reprogrammed Cells for Liver Regeneration After Injury

open access: yesAdvanced Science, EarlyView.
Donor‐derived tdTomato+ mature hepatocytes were FACS‐isolated and transplanted into Fah−/− host mice. During regeneration, these cells convert into proliferative, unipotent Afp+ rHeps. Their plasticity is governed by a PPARγ/AFP‐dependent metabolic switch, segregating into pro‐proliferative Afplow and pro‐survival Afphigh subpopulations.
Ting Fang   +12 more
wiley   +1 more source

Towards Sensor-Based Mobility Assessment for Older Adults: A Multimodal Framework Integrating PoseNet Gait Dynamics and InBody Composition

open access: yesSensors
The acceleration of global population aging has driven a surge in demand for health monitoring among older adults. However, traditional mobility assessment methods mostly rely on invasive measurements or laboratory-grade equipment, making it difficult to
Sinan Chen   +4 more
doaj   +1 more source

Spectral Decomposition of Chemical Semantics for Activity Cliffs‐Aware Molecular Property Prediction

open access: yesAdvanced Science, EarlyView.
PrismNet mimics chemical intuition by functioning as a computational prism, refracting molecular graphs into complementary semantic views and spectral frequencies. This dual‐decomposition strategy effectively captures both global topologies and subtle “activity cliff” perturbations.
Chaoyang Xie   +9 more
wiley   +1 more source

The semantics of the native greek verb suffixes / Chariton Charitonidis [PDF]

open access: yes, 2011
The aim of this paper is to give the semantic profile of the Greek verb-deriving suffixes -íz(o), -én(o), -év(o), -ón(o), -(i)áz(o), and -ín(o), with a special account of the ending -áo/-ó.
Charitōnidēs, Charitōn Ch.
core  

CACLENS: A Multitask Deep Learning System for Enzyme Discovery

open access: yesAdvanced Science, EarlyView.
CACLENS, a multimodal and multi‐task deep learning framework integrating cross‐attention, contrastive learning, and customized gate control, enables reaction type classification, EC number prediction, and reaction feasibility assessment. CACLENS accelerates functional enzyme discovery and identifies efficient Zearalenone (ZEN)‐degrading enzymes.
Xilong Yi   +5 more
wiley   +1 more source

Dynamic Clustering and Scaling Behavior of Active Particles under Confinement

open access: yesNanomaterials
A systematic investigation of the dynamic clustering behavior of active particles under confinement, including the effects of both particle density and active driving force, is presented based on a hybrid coarse-grained molecular dynamics simulation ...
Matthew Becton   +3 more
doaj   +1 more source

Mereological Ontology and Dynamic Semantics

open access: yesAnnals of the Japan Association for Philosophy of Science, 1999
A theory that can represent meanings of expressions including plurals and mass terms is defined. This theory (`Natural Representation Theory') is an extension of a system `extensional mereology with sortal individuation'. The underlying ontology is of Leśniewski kind based on the notions of thing, material and sortal predicates.
openaire   +2 more sources

The Anatomy and Facets of Dynamic Policies

open access: yes, 2015
Information flow policies are often dynamic; the security concerns of a program will typically change during execution to reflect security-relevant events. A key challenge is how to best specify, and give proper meaning to, such dynamic policies. A large
Broberg, Niklas   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy