Results 51 to 60 of about 3,157,454 (357)
PROMELA based formal verification for safety-critical software
聚焦安全关键软件, 研究基于PROMELA形式模型验证C程序中违反断言、数组越界、空指针解引用、死锁及饥饿等5类故障技术。建立C程序抽象语法树节点到PROMELA模型, 验证属性相关函数到PROMELA模型的2类映射规则; 根据映射规则提出由C程序自动生成PROMELA形式模型的算法, 并对算法进行理论分析; 针对C程序中5种故障类型, 分别给出基于PROMELA模型的形式化验证方法, 并分析验证的范围; 覆盖各类故障的验证范围, 为每类故障类型选取12个C程序案例进行实证研究 ...
XING Liang+3 more
doaj +1 more source
Formal verification of neural network controlled autonomous systems [PDF]
In this paper, we consider the problem of formally verifying the safety of an autonomous robot equipped with a Neural Network (NN) controller that processes LiDAR images to produce control actions.
Xiaowu Sun+2 more
semanticscholar +1 more source
In the adult T‐cell leukemia/lymphoma (ATL) cell line ED, the human T‐cell leukemia virus type 1 (HTLV‐1) provirus was integrated into the intron of the ift81 gene in the antisense orientation. Despite this integration, both the intact ift81 and the viral oncogene hbz were simultaneously expressed, likely due to the functional insufficiency of viral ...
Mayuko Yagi+5 more
wiley +1 more source
Combinatorial Abstractions of Dynamical Systems [PDF]
Formal verification has been successfully developed in computer science for verifying combinatorial classes of models and specifications. In like manner, formal verification methods have been developed for dynamical systems.
Rafael Wisniewski
doaj +1 more source
rTLS: Secure and Efficient TLS Session Resumption for the Internet of Things
In recent years, the Transport Layer Security (TLS) protocol has enjoyed rapid growth as a security protocol for the Internet of Things (IoT). In its newest iteration, TLS 1.3, the Internet Engineering Task Force (IETF) has standardized a zero round-trip
Koen Tange+4 more
doaj +1 more source
Neutrophil deficiency increases T cell numbers at the site of tissue injury in mice
In wild‐type mice, injury or acute inflammation induces neutrophil influx followed by macrophage accumulation. Mcl1ΔMyelo (neutrophil‐deficient) mice lack neutrophils, and in response to muscle injury show fewer macrophages and exhibit strikingly elevated T‐cell numbers, primarily non‐conventional “double‐negative” (DN) αβ and γδ T cells.
Hajnalka Halász+6 more
wiley +1 more source
Formal Verification and Co-Simulation in the Design of a Synchronous Motor Control Algorithm
Mechatronic systems are a class of cyber-physical systems, whose increasing complexity makes their validation and verification more and more difficult, while their requirements become more challenging.
Cinzia Bernardeschi+4 more
doaj +1 more source
Integrating ancestry, differential methylation analysis, and machine learning, we identified robust epigenetic signature genes (ESGs) and Core‐ESGs in Black and White women with endometrial cancer. Core‐ESGs (namely APOBEC1 and PLEKHG5) methylation levels were significantly associated with survival, with tumors from high African ancestry (THA) showing ...
Huma Asif, J. Julie Kim
wiley +1 more source
Formal verification for a PMQTT protocol
The future of Internet of Things (IoT) foresees a world of interconnected people with every physical object in a seamless manner. The security related aspects for the IoT world are still an open field of discussion and research.
Eman Elemam+3 more
doaj
CRYPTOGRAPHIC PROTOCOLS SPECIFICATION AND VERIFICATION TOOLS - A SURVEY
Cryptographic protocols cannot guarantee the secure operations by merely using state-of-the-art cryptographic mechanisms. Validation of such protocols is done by using formal methods. Various specialized tools have been developed for this purpose and are
Amol H Shinde, A J Umbarkar, N R Pillai
doaj +1 more source