Results 101 to 110 of about 3,649,820 (385)
QWIRE Practice: Formal Verification of Quantum Circuits in Coq [PDF]
We describe an embedding of the QWIRE quantum circuit language in the Coq proof assistant. This allows programmers to write quantum circuits using high-level abstractions and to prove properties of those circuits using Coq's theorem proving features. The
Robert Rand +2 more
semanticscholar +1 more source
This real‐world study of ROS1+ NSCLC highlights fusion diversity, treatment outcomes with crizotinib and lorlatinib, and in vitro experiments with resistance mechanisms. G2032R drives strong resistance to ROS1‐targeted TKIs, especially lorlatinib. Fusion partner location does not affect overall survival to crizotinib or lorlatinib. Findings support the
Fenneke Zwierenga +8 more
wiley +1 more source
Formal Verification of Differential Privacy for Interactive Systems
Differential privacy is a promising approach to privacy preserving data analysis with a well-developed theory for functions. Despite recent work on implementing systems that aim to provide differential privacy, the problem of formally verifying that ...
Datta, Anupam +2 more
core +2 more sources
Formal Modeling and Verification of CloudProxy [PDF]
Services running in the cloud face threats from several parties, including malicious clients, administrators, and external attackers. CloudProxy is a recently-proposed framework for secure deployment of cloud applications. In this work, we present the first formal model of CloudProxy, including a formal specification of desired security properties.
Tan, Wei Yang +3 more
openaire +3 more sources
This study investigated how PYCR1 inhibition in bone marrow stromal cells (BMSCs) indirectly affects multiple myeloma (MM) cell metabolism and viability. Culturing MM cells in conditioned medium from PYCR1‐silenced BMSCs impaired oxidative phosphorylation and increased sensitivity to bortezomib.
Inge Oudaert +13 more
wiley +1 more source
Formal verification of a constant-time preserving C compiler
Timing side-channels are arguably one of the main sources of vulnerabilities in cryptographic implementations. One effective mitigation against timing side-channels is to write programs that do not perform secret-dependent branches and memory accesses ...
G. Barthe +6 more
semanticscholar +1 more source
Following high dose rate brachytherapy (HDR‐BT) for hepatocellular carcinoma (HCC), patients were classified as responders and nonresponders. Post‐therapy serum induced increased BrdU incorporation and Cyclin E expression of Huh7 and HepG2 cells in nonresponders, but decreased levels in responders.
Lukas Salvermoser +14 more
wiley +1 more source
A Synthesized Framework for Formal Verification of Computing Systems [PDF]
Design process of computing systems gradually evolved to a level that encompasses formal verification techniques. However, the integration of formal verification techniques into a methodical design procedure has many inherent miscomprehensions and ...
Nikola Bogunovic +2 more
doaj
Formally verifying Ada programs which use real number types [PDF]
Formal verification is applied to programs which use real number arithmetic operations (mathematical programs). Formal verification of a program P consists of creating a mathematical model of F, stating the desired properties of P in a formal logical ...
Sutherland, David
core +1 more source
Formal verification of an autonomous personal robotic assistant [PDF]
Human–robot teams are likely to be used in a variety of situations wherever humans require the assistance of robotic systems. Obvious examples include healthcare and manufacturing, in which people need the assistance of machines to perform key tasks.
Dautenhahn, K. +6 more
core

