Results 11 to 20 of about 34,882,646 (291)

Using Lightweight Formal Methods to Validate a Key-Value Storage Node in Amazon S3

open access: yesSymposium on Operating Systems Principles, 2021
This paper reports our experience applying lightweight formal methods to validate the correctness of ShardStore, a new key-value storage node implementation for the Amazon S3 cloud object storage service.
James Bornholt   +11 more
semanticscholar   +1 more source

Formal methods [PDF]

open access: yesACM Computing Surveys, 2009
Formal methods use mathematical models for analysis and verification at any part of the program life-cycle. We describe the state of the art in the industrial use of formal methods, concentrating on their increasing use at the earlier stages of specification and design.
Woodcock J   +3 more
openaire   +3 more sources

Using formal methods for autonomous systems: Five recipes for formal verification [PDF]

open access: yesProceedings of the Institution of Mechanical Engineers. Part O, Journal of risk and reliability, 2020
Formal Methods are mathematically-based techniques for software design and engineering, which enable the unambiguous description of and reasoning about a system’s behaviour.
Matt Luckcuck
semanticscholar   +1 more source

Setting Parameters for Biological Models With ANIMO [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2014
ANIMO (Analysis of Networks with Interactive MOdeling) is a software for modeling biological networks, such as e.g. signaling, metabolic or gene networks. An ANIMO model is essentially the sum of a network topology and a number of interaction parameters.
Stefano Schivo   +5 more
doaj   +1 more source

Approximation Hierarchies for the Copositive Tensor Cone and Their Application to the Polynomial Optimization over the Simplex

open access: yesMathematics, 2022
In this paper, we discuss the cone of copositive tensors and its approximation. We describe some basic properties of copositive tensors and positive semidefinite tensors. Specifically, we show that a non-positive tensor (or Z-tensor) is copositive if and
Muhammad Faisal Iqbal, Faizan Ahmed
doaj   +1 more source

On the Convergence of Artificial Intelligence and Distributed Ledger Technology: A Scoping Review and Future Research Agenda

open access: yesIEEE Access, 2020
Developments in artificial intelligence (AI) and distributed ledger technology (DLT) currently lead to lively debates in academia and practice. AI processes data to perform tasks that were previously thought possible only for humans.
Konstantin D. Pandl   +3 more
doaj   +1 more source

An ECHO of Cartilage: In Silico Prediction of Combinatorial Treatments to Switch Between Transient and Permanent Cartilage Phenotypes With Ex Vivo Validation

open access: yesFrontiers in Bioengineering and Biotechnology, 2021
A fundamental question in cartilage biology is: what determines the switch between permanent cartilage found in the articular joints and transient hypertrophic cartilage that functions as a template for bone?
Sakshi Khurana   +13 more
doaj   +1 more source

Gaussian Process Panel Modeling—Machine Learning Inspired Analysis of Longitudinal Panel Data

open access: yesFrontiers in Psychology, 2020
In this article, we extend the Bayesian nonparametric regression method Gaussian Process Regression to the analysis of longitudinal panel data. We call this new approach Gaussian Process Panel Modeling (GPPM).
Julian D. Karch   +4 more
doaj   +1 more source

Evaluation of Machine Learning and Web-Based Process for Damage Score Estimation of Existing Buildings

open access: yesBuildings, 2022
The seismic vulnerability assessment of existing reinforced concrete (RC) buildings is a significant source of disaster mitigation plans and rescue services. Different countries evolved various Rapid Visual Screening (RVS) techniques and methodologies to
Vandana Kumari   +3 more
doaj   +1 more source

A Survey of Static Formal Methods for Building Dependable Industrial Automation Systems [PDF]

open access: yesIEEE Transactions on Industrial Informatics, 2019
Industrial automation systems (IAS) need to be highly dependable; they should not merely function as expected but also do so in a reliable, safe, and secure manner.
R. Sinha   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy