Results 71 to 80 of about 3,157,454 (357)

Formal Verification of AADL Models by Event-B

open access: yesIEEE Access, 2020
AADL is widely used to depict the architecture and behavior of real-time safety-critical systems such as avionics and aerospace. The development of these systems has strict requirements for building fault-free systems.
Abeer Saeed Abdo Hadad   +2 more
doaj   +1 more source

Coverage Metrics for Formal Verification [PDF]

open access: yesInternational Journal on Software Tools for Technology Transfer, 2003
In formal verification, we verify that a system is correct with respect to a specification. Even when the system is proven to be correct, there is still a question of how complete the specification is, and whether it really covers all the behaviors of the system.
Orna Kupferman   +2 more
openaire   +3 more sources

Molecular imaging predicts trastuzumab‐deruxtecan (T‐DXd) response in head and neck cancer xenograft models

open access: yesMolecular Oncology, EarlyView.
Trastuzumab‐deruxtecan, a HER2‐targeting antibody‐drug conjugate, shows promising antitumor activity in head and neck squamous cell carcinoma with low HER2 expression. In vitro and in vivo studies demonstrated dose‐dependent cell death and tumor growth reduction in low HER2‐expressing cell lines, which correlated with drug accumulation measured using a
Abdullah Bin Naveed   +8 more
wiley   +1 more source

EMT‐associated bias in the Parsortix® system observed with pancreatic cancer cell lines

open access: yesMolecular Oncology, EarlyView.
The Parsortix® system was tested for CTC enrichment using pancreatic cancer cell lines with different EMT phenotypes. Spike‐in experiments showed lower recovery of mesenchymal‐like cells. This was confirmed with an EMT‐inducible breast cancer cell line.
Nele Vandenbussche   +8 more
wiley   +1 more source

Research on formal description and verification of automated trust negotiation

open access: yesTongxin xuebao, 2011
First,a unified ATN formal framework was presented,into which typical negotiation strategies could be reduced.Second,the formal verification of ATN was defined based on the formal framework.The objectives and procedures of the formal verification of ATN ...
GUAN Shang-yuan 1   +3 more
doaj   +2 more sources

Towards formal verification of cyber security standards

open access: yesТруды Института системного программирования РАН, 2018
Cyber security standards are often used to ensure the security of industrial control systems. Nowadays, these systems are becoming more decentralized, making them more vulnerable to cyber attacks.
Tomas Kulik, Peter Gorm Larsen
doaj   +1 more source

An experimental Study using ACSL and Frama-C to formulate and verify Low-Level Requirements from a DO-178C compliant Avionics Project [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2015
Safety critical avionics software is a natural application area for formal verification. This is reflected in the formal method's inclusion into the certification guideline DO-178C and its formal methods supplement DO-333.
Frank Dordowsky
doaj   +1 more source

Formal Specification and Verification of Autonomous Robotic Systems [PDF]

open access: yesACM Computing Surveys, 2018
Autonomous robotic systems are complex, hybrid, and often safety critical; this makes their formal specification and verification uniquely challenging. Though commonly used, testing and simulation alone are insufficient to ensure the correctness of, or ...
Matt Luckcuck   +4 more
semanticscholar   +1 more source

Formal Modeling and Verification of CloudProxy [PDF]

open access: yes, 2014
Services running in the cloud face threats from several parties, including malicious clients, administrators, and external attackers. CloudProxy is a recently-proposed framework for secure deployment of cloud applications. In this work, we present the first formal model of CloudProxy, including a formal specification of desired security properties.
Tan, Wei Yang   +3 more
openaire   +3 more sources

Integrative miRNOMe profiling reveals the miR‐195‐5p–CHEK1 axis and its impact on luminal breast cancer outcomes

open access: yesMolecular Oncology, EarlyView.
In luminal (ER+) breast carcinoma (BC), miRNA profiling identified miR‐195‐5p as a key regulator of proliferation that targets CHEK1, CDC25A, and CCNE1. High CHEK1 expression correlates with worse relapse‐free survival after chemotherapy, especially in patients with luminal A subtype.
Veronika Boušková   +14 more
wiley   +1 more source

Home - About - Disclaimer - Privacy