Results 31 to 40 of about 565,922 (289)

Concurrent software fine‐coarse‐grained automatic modelling by Coloured Petri Nets for model checking

open access: yesIET Software, 2023
The state space explosion restricts the error detection of concurrent software. The abstraction can provide a solution to avoid state space explosion, but it is easy to ignore important details, resulting in inaccurate detection results.
Wenjie Zhong, Jian‐tao Zhou, Tao Sun
doaj   +1 more source

A Survey of Languages for Specifying Dynamics: A Knowledge Engineering Perspective [PDF]

open access: yes, 2000
A number of formal specification languages for knowledge-based systems has been developed. Characteristics for knowledge-based systems are a complex knowledge base and an inference engine which uses this knowledge to solve a given problem.
Engelfriet, Joeri   +6 more
core   +7 more sources

Teaching Formal Models of Concurrency Specification and Analysis

open access: yesМоделирование и анализ информационных систем, 2015
There is a widespread and rapidly growing interest to the parallel programming nowadays. This interest is based on availability of supercomputers, computer clusters and powerful graphic processors for computational mathematics and simulation. MPI, OpenMP,
N. V. Shilov
doaj   +1 more source

From English to Formal Specifications [PDF]

open access: yesThe Computer Journal, 1994
Formal methods provide an approach in which design steps can be shown to satisfy a specification. However, if a formal specification is wrong, then although the design steps may satisfy the formal specification, they are unlikely to satisfy the requirements of the system.
Vadera, S, Meziane, F
openaire   +2 more sources

Towards Topology-Free Programming for Cyber-Physical Systems with Process-Oriented Paradigm

open access: yesSensors, 2023
The paper proposes a topology-free specification of distributed control systems by means of a process-oriented programming paradigm. The proposed approach was characterized, on the one hand, by a topologically independent specification of the control ...
Vladimir E. Zyubin   +3 more
doaj   +1 more source

Transferrin receptor 1‐mediated iron uptake supports thermogenic activation in human cervical‐derived adipocytes

open access: yesFEBS Letters, EarlyView.
In this study, we found that human cervical‐derived adipocytes maintain intracellular iron level by regulating the expression of iron transport‐related proteins during adrenergic stimulation. Melanotransferrin is predicted to interact with transferrin receptor 1 based on in silico analysis.
Rahaf Alrifai   +9 more
wiley   +1 more source

Requirements analysis of the VoD application using the tools in TRADE [PDF]

open access: yes, 1996
This report contains a specification of requirements for a video-on-demand (VoD) application developed at Belgacom, used as a trial application in the 2RARE project. The specification contains three parts: an informal specification in natural language; a
Huyts, Sander, Wieringa, R.J.
core   +2 more sources

Weighted Modal Transition Systems [PDF]

open access: yes, 2012
Specification theories as a tool in model-driven development processes of component-based software systems have recently attracted a considerable attention.
Bauer, Sebastian S.   +5 more
core   +5 more sources

Transcriptional network analysis of PTEN‐protein‐deficient prostate tumors reveals robust stromal reprogramming and signs of senescent paracrine communication

open access: yesMolecular Oncology, EarlyView.
Combining PTEN protein assessment and transcriptomic profiling of prostate tumors, we uncovered a network enriched in senescence and extracellular matrix (ECM) programs associated with PTEN loss and conserved in a mouse model. We show that PTEN‐deficient cells trigger paracrine remodeling of the surrounding stroma and this information could help ...
Ivana Rondon‐Lorefice   +16 more
wiley   +1 more source

A Formal TLS Handshake Model in LNT [PDF]

open access: yes, 2018
Testing of network services represents one of the biggest challenges in cyber security. Because new vulnerabilities are detected on a regular basis, more research is needed.
Bozic, Josip   +3 more
core   +3 more sources

Home - About - Disclaimer - Privacy