Results 71 to 80 of about 580,783 (342)

Towards formal verification of cyber security standards

open access: yesТруды Института системного программирования РАН, 2018
Cyber security standards are often used to ensure the security of industrial control systems. Nowadays, these systems are becoming more decentralized, making them more vulnerable to cyber attacks.
Tomas Kulik, Peter Gorm Larsen
doaj   +1 more source

Patient‐specific pharmacogenomics demonstrates xCT as predictive therapeutic target in colon cancer with possible implications in tumor connectivity

open access: yesMolecular Oncology, EarlyView.
This study integrates transcriptomic profiling of matched tumor and healthy tissues from 32 colorectal cancer patients with functional validation in patient‐derived organoids, revealing dysregulated metabolic programs driven by overexpressed xCT (SLC7A11) and SLC3A2, identifying an oncogenic cystine/glutamate transporter signature linked to ...
Marco Strecker   +16 more
wiley   +1 more source

The neural crest‐associated gene ERRFI1 is involved in melanoma progression and resistance toward targeted therapy

open access: yesMolecular Oncology, EarlyView.
ERRFI1, a neural crest (NC)‐associated gene, was upregulated in melanoma and negatively correlated with the expression of melanocytic differentiation markers and the susceptibility of melanoma cells toward BRAF inhibitors (BRAFi). Knocking down ERRFI1 significantly increased the sensitivity of melanoma cells to BRAFi.
Nina Wang   +8 more
wiley   +1 more source

Formal Verification of Nonlinear Inequalities with Taylor Interval Approximations

open access: yes, 2013
We present a formal tool for verification of multivariate nonlinear inequalities. Our verification method is based on interval arithmetic with Taylor approximations.
A. Tarski   +12 more
core   +1 more source

Formal Verification of Input-Output Mappings of Tree Ensembles

open access: yes, 2020
Recent advances in machine learning and artificial intelligence are now being considered in safety-critical autonomous systems where software defects may cause severe harm to humans and the environment. Design organizations in these domains are currently
Nadjm-Tehrani, Simin, Törnblom, John
core   +1 more source

Plasma extrachromosomal circular DNA as a biomarker in EGFR‐targeted therapy of non‐small cell lung cancer

open access: yesMolecular Oncology, EarlyView.
Detection of extrachromosomal circular DNA (eccDNA) in plasma samples from EGFR‐mutated non‐small cell lung cancer patients. Plasma was collected before and during treatment with the EGFR‐tyrosine kinase inhibitor osimertinib. Plasma eccDNA was detected in all cancer samples, and the presence of the EGFR gene on eccDNA serves as a potential biomarker ...
Simone Stensgaard   +5 more
wiley   +1 more source

Formally verifying Ada programs which use real number types [PDF]

open access: yes
Formal verification is applied to programs which use real number arithmetic operations (mathematical programs). Formal verification of a program P consists of creating a mathematical model of F, stating the desired properties of P in a formal logical ...
Sutherland, David
core   +1 more source

User-friendly Support for Common Concepts in a Lightweight Verifier [PDF]

open access: yes, 2010
Machine verification of formal arguments can only increase our confidence in the correctness of those arguments, but the costs of employing machine verification still outweigh the benefits for some common kinds of formal reasoning activities. As a result,
Lapets, Andrei
core   +1 more source

Formal Verification of Neural Network Controlled Autonomous Systems

open access: yes, 2018
In this paper, we consider the problem of formally verifying the safety of an autonomous robot equipped with a Neural Network (NN) controller that processes LiDAR images to produce control actions.
Akintunde M. E.   +10 more
core   +1 more source

Home - About - Disclaimer - Privacy