Results 41 to 50 of about 4,463,103 (324)

Cause-Consequence Diagram Reliability Analysis Using Formal Techniques With Application to Electrical Power Networks

open access: yesIEEE Access, 2021
Cause-consequence Diagram (CCD) is widely used as a deductive safety analysis technique for decision-making at the critical-system design stage. This approach models the causes of subsystem failures in a highly-critical system and their potential ...
Mohamed Abdelghany, Sofiene Tahar
doaj   +1 more source

A Systematic Review of Evidence on the Clinical Effectiveness of Surveillance Imaging in Children With Medulloblastoma and Ependymoma

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Surveillance imaging aims to detect tumour relapse before symptoms develop, but it's unclear whether earlier detection of relapse leads to better outcomes in children and young people (CYP) with medulloblastoma and ependymoma. This systematic review aims to identify relevant literature to determine the efficacy of surveillance magnetic ...
Lucy Shepherd   +3 more
wiley   +1 more source

Models@Runtime: The Development and Re-Configuration Management of Python Applications Using Formal Methods

open access: yesApplied Sciences, 2021
Models@runtime (models at runtime) are based on computation reflection. Runtime models can be regarded as a reflexive layer causally connected with the underlying system. Hence, every change in the runtime model involves a change in the reflected system,
Mohammed Mounir Bouhamed   +4 more
doaj   +1 more source

Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack: A Pledge for Formal Methods in the Field of Implementation Security [PDF]

open access: yes, 2014
In our paper at PROOFS 2013, we formally studied a few known countermeasures to protect CRT-RSA against the BellCoRe fault injection attack. However, we left Vigilant's countermeasure and its alleged repaired version by Coron et al.
Guilley, Sylvain, Rauzy, Pablo
core   +3 more sources

An intracellular transporter mitigates the CO2‐induced decline in iron content in Arabidopsis shoots

open access: yesFEBS Letters, EarlyView.
This study identifies a gene encoding a transmembrane protein, MIC, which contributes to the reduction of shoot Fe content observed in plants under elevated CO2. MIC is a putative Fe transporter localized to the Golgi and endosomal compartments. Its post‐translational regulation in roots may represent a potential target for improving plant nutrition ...
Timothy Mozzanino   +7 more
wiley   +1 more source

Formal Methods and Validation Techniques for Ensuring Automotive Systems Security

open access: yesInformation, 2023
The increasing complexity and connectivity of automotive systems have raised concerns about their vulnerability to security breaches. As a result, the integration of formal methods and validation techniques has become crucial in ensuring the security of ...
Moez Krichen
doaj   +1 more source

FORTEST: Formal methods and testing [PDF]

open access: yes, 2002
Formal methods have traditionally been used for specification and development of software. However there are potential benefits for the testing stage as well.
Bogdanov, K   +5 more
core   +1 more source

Time after time – circadian clocks through the lens of oscillator theory

open access: yesFEBS Letters, EarlyView.
Oscillator theory bridges physics and circadian biology. Damped oscillators require external drivers, while limit cycles emerge from delayed feedback and nonlinearities. Coupling enables tissue‐level coherence, and entrainment aligns internal clocks with environmental cues.
Marta del Olmo   +2 more
wiley   +1 more source

FORMAL METHODS OF EXPERT ESTIMATIONS

open access: yesСтатистика и экономика, 2016
This article series discusses formal methods of expert assessments. Usingthe Delphi method helps to formalize theprocedures for the collection, compilationand analysis of the views of specialists inorder to convert them into a form most convenient for ...
Tea Ya. Danelyan
doaj   +1 more source

Declarative Specification [PDF]

open access: yes, 1996
Deriving formal specifications from informal requirements is extremely difficult since one has to overcome the conceptual gap between an application domain and the domain of formal specification methods.
David Robertson   +11 more
core   +2 more sources

Home - About - Disclaimer - Privacy