Results 71 to 80 of about 3,157,454 (357)
Formal Verification of AADL Models by Event-B
AADL is widely used to depict the architecture and behavior of real-time safety-critical systems such as avionics and aerospace. The development of these systems has strict requirements for building fault-free systems.
Abeer Saeed Abdo Hadad+2 more
doaj +1 more source
Coverage Metrics for Formal Verification [PDF]
In formal verification, we verify that a system is correct with respect to a specification. Even when the system is proven to be correct, there is still a question of how complete the specification is, and whether it really covers all the behaviors of the system.
Orna Kupferman+2 more
openaire +3 more sources
Trastuzumab‐deruxtecan, a HER2‐targeting antibody‐drug conjugate, shows promising antitumor activity in head and neck squamous cell carcinoma with low HER2 expression. In vitro and in vivo studies demonstrated dose‐dependent cell death and tumor growth reduction in low HER2‐expressing cell lines, which correlated with drug accumulation measured using a
Abdullah Bin Naveed+8 more
wiley +1 more source
EMT‐associated bias in the Parsortix® system observed with pancreatic cancer cell lines
The Parsortix® system was tested for CTC enrichment using pancreatic cancer cell lines with different EMT phenotypes. Spike‐in experiments showed lower recovery of mesenchymal‐like cells. This was confirmed with an EMT‐inducible breast cancer cell line.
Nele Vandenbussche+8 more
wiley +1 more source
Research on formal description and verification of automated trust negotiation
First,a unified ATN formal framework was presented,into which typical negotiation strategies could be reduced.Second,the formal verification of ATN was defined based on the formal framework.The objectives and procedures of the formal verification of ATN ...
GUAN Shang-yuan 1+3 more
doaj +2 more sources
Towards formal verification of cyber security standards
Cyber security standards are often used to ensure the security of industrial control systems. Nowadays, these systems are becoming more decentralized, making them more vulnerable to cyber attacks.
Tomas Kulik, Peter Gorm Larsen
doaj +1 more source
An experimental Study using ACSL and Frama-C to formulate and verify Low-Level Requirements from a DO-178C compliant Avionics Project [PDF]
Safety critical avionics software is a natural application area for formal verification. This is reflected in the formal method's inclusion into the certification guideline DO-178C and its formal methods supplement DO-333.
Frank Dordowsky
doaj +1 more source
Formal Specification and Verification of Autonomous Robotic Systems [PDF]
Autonomous robotic systems are complex, hybrid, and often safety critical; this makes their formal specification and verification uniquely challenging. Though commonly used, testing and simulation alone are insufficient to ensure the correctness of, or ...
Matt Luckcuck+4 more
semanticscholar +1 more source
Formal Modeling and Verification of CloudProxy [PDF]
Services running in the cloud face threats from several parties, including malicious clients, administrators, and external attackers. CloudProxy is a recently-proposed framework for secure deployment of cloud applications. In this work, we present the first formal model of CloudProxy, including a formal specification of desired security properties.
Tan, Wei Yang+3 more
openaire +3 more sources
In luminal (ER+) breast carcinoma (BC), miRNA profiling identified miR‐195‐5p as a key regulator of proliferation that targets CHEK1, CDC25A, and CCNE1. High CHEK1 expression correlates with worse relapse‐free survival after chemotherapy, especially in patients with luminal A subtype.
Veronika Boušková+14 more
wiley +1 more source