Results 51 to 60 of about 117,504 (308)

Time after time – circadian clocks through the lens of oscillator theory

open access: yesFEBS Letters, EarlyView.
Oscillator theory bridges physics and circadian biology. Damped oscillators require external drivers, while limit cycles emerge from delayed feedback and nonlinearities. Coupling enables tissue‐level coherence, and entrainment aligns internal clocks with environmental cues.
Marta del Olmo   +2 more
wiley   +1 more source

Coverage Metrics for Formal Verification [PDF]

open access: yesInternational Journal on Software Tools for Technology Transfer, 2003
In formal verification, we verify that a system is correct with respect to a specification. Even when the system is proven to be correct, there is still a question of how complete the specification is, and whether it really covers all the behaviors of the system.
Hana Chockler   +2 more
openaire   +2 more sources

Cell density–dependent nuclear‐cytoplasmic shuttling of SETDB1 integrates with Hippo signaling to regulate YAP1‐mediated transcription

open access: yesFEBS Letters, EarlyView.
At low cell density, SETDB1 and YAP1 accumulate in the nucleus. As cell density increases, the Hippo pathway is gradually activated, and SETDB1 is associated with increased YAP1 phosphorylation. At high cell density, phosphorylated YAP1 is sequestered in the cytoplasm, while SETDB1 becomes polyubiquitinated and degraded by the ubiquitin–proteasome ...
Jaemin Eom   +3 more
wiley   +1 more source

Formal Verification of AADL Models by Event-B

open access: yesIEEE Access, 2020
AADL is widely used to depict the architecture and behavior of real-time safety-critical systems such as avionics and aerospace. The development of these systems has strict requirements for building fault-free systems.
Abeer Saeed Abdo Hadad   +2 more
doaj   +1 more source

Inhibiting stearoyl‐CoA desaturase suppresses bone metastatic prostate cancer by modulating cellular stress, mTOR signaling, and DNA damage response

open access: yesFEBS Letters, EarlyView.
Bone metastasis in prostate cancer (PCa) patients is a clinical hurdle due to the poor understanding of the supportive bone microenvironment. Here, we identify stearoyl‐CoA desaturase (SCD) as a tumor‐promoting enzyme and potential therapeutic target in bone metastatic PCa.
Alexis Wilson   +7 more
wiley   +1 more source

Combinatorial Abstractions of Dynamical Systems [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2013
Formal verification has been successfully developed in computer science for verifying combinatorial classes of models and specifications. In like manner, formal verification methods have been developed for dynamical systems.
Rafael Wisniewski
doaj   +1 more source

Formal Verification of a MAC Protocol for Underwater Sensor Networks

open access: yesIEEE Access, 2023
The use of Underwater Sensor Networks (UWSN) for underwater ocean applications such as seismic event detection, target detection, marine resource monitoring, and oil bed monitoring is growing.
N. Suresh Kumar   +3 more
doaj   +1 more source

Adenosine‐to‐inosine editing of miR‐200b‐3p is associated with the progression of high‐grade serous ovarian cancer

open access: yesMolecular Oncology, EarlyView.
A‐to‐I editing of miRNAs, particularly miR‐200b‐3p, contributes to HGSOC progression by enhancing cancer cell proliferation, migration and 3D growth. The edited form is linked to poorer patient survival and the identification of novel molecular targets.
Magdalena Niemira   +14 more
wiley   +1 more source

Investigating the cell of origin and novel molecular targets in Merkel cell carcinoma: a historic misnomer

open access: yesMolecular Oncology, EarlyView.
This study indicates that Merkel cell carcinoma (MCC) does not originate from Merkel cells, and identifies gene, protein & cellular expression of immune‐linked and neuroendocrine markers in primary and metastatic Merkel cell carcinoma (MCC) tumor samples, linked to Merkel cell polyomavirus (MCPyV) status, with enrichment of B‐cell and other immune cell
Richie Jeremian   +10 more
wiley   +1 more source

Towards formal verification of cyber security standards

open access: yesТруды Института системного программирования РАН, 2018
Cyber security standards are often used to ensure the security of industrial control systems. Nowadays, these systems are becoming more decentralized, making them more vulnerable to cyber attacks.
Tomas Kulik, Peter Gorm Larsen
doaj   +1 more source

Home - About - Disclaimer - Privacy