Results 51 to 60 of about 117,504 (308)
Time after time – circadian clocks through the lens of oscillator theory
Oscillator theory bridges physics and circadian biology. Damped oscillators require external drivers, while limit cycles emerge from delayed feedback and nonlinearities. Coupling enables tissue‐level coherence, and entrainment aligns internal clocks with environmental cues.
Marta del Olmo +2 more
wiley +1 more source
Coverage Metrics for Formal Verification [PDF]
In formal verification, we verify that a system is correct with respect to a specification. Even when the system is proven to be correct, there is still a question of how complete the specification is, and whether it really covers all the behaviors of the system.
Hana Chockler +2 more
openaire +2 more sources
At low cell density, SETDB1 and YAP1 accumulate in the nucleus. As cell density increases, the Hippo pathway is gradually activated, and SETDB1 is associated with increased YAP1 phosphorylation. At high cell density, phosphorylated YAP1 is sequestered in the cytoplasm, while SETDB1 becomes polyubiquitinated and degraded by the ubiquitin–proteasome ...
Jaemin Eom +3 more
wiley +1 more source
Formal Verification of AADL Models by Event-B
AADL is widely used to depict the architecture and behavior of real-time safety-critical systems such as avionics and aerospace. The development of these systems has strict requirements for building fault-free systems.
Abeer Saeed Abdo Hadad +2 more
doaj +1 more source
Bone metastasis in prostate cancer (PCa) patients is a clinical hurdle due to the poor understanding of the supportive bone microenvironment. Here, we identify stearoyl‐CoA desaturase (SCD) as a tumor‐promoting enzyme and potential therapeutic target in bone metastatic PCa.
Alexis Wilson +7 more
wiley +1 more source
Combinatorial Abstractions of Dynamical Systems [PDF]
Formal verification has been successfully developed in computer science for verifying combinatorial classes of models and specifications. In like manner, formal verification methods have been developed for dynamical systems.
Rafael Wisniewski
doaj +1 more source
Formal Verification of a MAC Protocol for Underwater Sensor Networks
The use of Underwater Sensor Networks (UWSN) for underwater ocean applications such as seismic event detection, target detection, marine resource monitoring, and oil bed monitoring is growing.
N. Suresh Kumar +3 more
doaj +1 more source
A‐to‐I editing of miRNAs, particularly miR‐200b‐3p, contributes to HGSOC progression by enhancing cancer cell proliferation, migration and 3D growth. The edited form is linked to poorer patient survival and the identification of novel molecular targets.
Magdalena Niemira +14 more
wiley +1 more source
This study indicates that Merkel cell carcinoma (MCC) does not originate from Merkel cells, and identifies gene, protein & cellular expression of immune‐linked and neuroendocrine markers in primary and metastatic Merkel cell carcinoma (MCC) tumor samples, linked to Merkel cell polyomavirus (MCPyV) status, with enrichment of B‐cell and other immune cell
Richie Jeremian +10 more
wiley +1 more source
Towards formal verification of cyber security standards
Cyber security standards are often used to ensure the security of industrial control systems. Nowadays, these systems are becoming more decentralized, making them more vulnerable to cyber attacks.
Tomas Kulik, Peter Gorm Larsen
doaj +1 more source

