Results 51 to 60 of about 3,157,454 (357)

PROMELA based formal verification for safety-critical software

open access: yesXibei Gongye Daxue Xuebao, 2022
聚焦安全关键软件, 研究基于PROMELA形式模型验证C程序中违反断言、数组越界、空指针解引用、死锁及饥饿等5类故障技术。建立C程序抽象语法树节点到PROMELA模型, 验证属性相关函数到PROMELA模型的2类映射规则; 根据映射规则提出由C程序自动生成PROMELA形式模型的算法, 并对算法进行理论分析; 针对C程序中5种故障类型, 分别给出基于PROMELA模型的形式化验证方法, 并分析验证的范围; 覆盖各类故障的验证范围, 为每类故障类型选取12个C程序案例进行实证研究 ...
XING Liang   +3 more
doaj   +1 more source

Formal verification of neural network controlled autonomous systems [PDF]

open access: yesInternational Conference on Hybrid Systems: Computation and Control, 2018
In this paper, we consider the problem of formally verifying the safety of an autonomous robot equipped with a Neural Network (NN) controller that processes LiDAR images to produce control actions.
Xiaowu Sun   +2 more
semanticscholar   +1 more source

Intron‐oriented HTLV‐1 integration in an adult T‐cell leukemia/lymphoma cell line sustains expression of intact ift81 mRNA

open access: yesFEBS Letters, EarlyView.
In the adult T‐cell leukemia/lymphoma (ATL) cell line ED, the human T‐cell leukemia virus type 1 (HTLV‐1) provirus was integrated into the intron of the ift81 gene in the antisense orientation. Despite this integration, both the intact ift81 and the viral oncogene hbz were simultaneously expressed, likely due to the functional insufficiency of viral ...
Mayuko Yagi   +5 more
wiley   +1 more source

Combinatorial Abstractions of Dynamical Systems [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2013
Formal verification has been successfully developed in computer science for verifying combinatorial classes of models and specifications. In like manner, formal verification methods have been developed for dynamical systems.
Rafael Wisniewski
doaj   +1 more source

rTLS: Secure and Efficient TLS Session Resumption for the Internet of Things

open access: yesSensors, 2021
In recent years, the Transport Layer Security (TLS) protocol has enjoyed rapid growth as a security protocol for the Internet of Things (IoT). In its newest iteration, TLS 1.3, the Internet Engineering Task Force (IETF) has standardized a zero round-trip
Koen Tange   +4 more
doaj   +1 more source

Neutrophil deficiency increases T cell numbers at the site of tissue injury in mice

open access: yesFEBS Letters, EarlyView.
In wild‐type mice, injury or acute inflammation induces neutrophil influx followed by macrophage accumulation. Mcl1ΔMyelo (neutrophil‐deficient) mice lack neutrophils, and in response to muscle injury show fewer macrophages and exhibit strikingly elevated T‐cell numbers, primarily non‐conventional “double‐negative” (DN) αβ and γδ T cells.
Hajnalka Halász   +6 more
wiley   +1 more source

Formal Verification and Co-Simulation in the Design of a Synchronous Motor Control Algorithm

open access: yesEnergies, 2020
Mechatronic systems are a class of cyber-physical systems, whose increasing complexity makes their validation and verification more and more difficult, while their requirements become more challenging.
Cinzia Bernardeschi   +4 more
doaj   +1 more source

Comparing self‐reported race and genetic ancestry for identifying potential differentially methylated sites in endometrial cancer: insights from African ancestry proportions using machine learning models

open access: yesMolecular Oncology, EarlyView.
Integrating ancestry, differential methylation analysis, and machine learning, we identified robust epigenetic signature genes (ESGs) and Core‐ESGs in Black and White women with endometrial cancer. Core‐ESGs (namely APOBEC1 and PLEKHG5) methylation levels were significantly associated with survival, with tumors from high African ancestry (THA) showing ...
Huma Asif, J. Julie Kim
wiley   +1 more source

Formal verification for a PMQTT protocol

open access: yesEgyptian Informatics Journal, 2020
The future of Internet of Things (IoT) foresees a world of interconnected people with every physical object in a seamless manner. The security related aspects for the IoT world are still an open field of discussion and research.
Eman Elemam   +3 more
doaj  

CRYPTOGRAPHIC PROTOCOLS SPECIFICATION AND VERIFICATION TOOLS - A SURVEY

open access: yesICTACT Journal on Communication Technology, 2017
Cryptographic protocols cannot guarantee the secure operations by merely using state-of-the-art cryptographic mechanisms. Validation of such protocols is done by using formal methods. Various specialized tools have been developed for this purpose and are
Amol H Shinde, A J Umbarkar, N R Pillai
doaj   +1 more source

Home - About - Disclaimer - Privacy