Results 51 to 60 of about 736,363 (296)

Checking domains in Basque and Breton

open access: yesAnuario del Seminario de Filología Vasca "Julio de Urquijo", 1993
This article presents an analysis of some restrictions on verb initial word orders in Basque. Following Rivero's (1993a) analysis of similar facts in Breton, I will claim that the morphological feature for tense in these languages must occur in a ...
Jon Ortiz de Urbina
doaj   +1 more source

Dynamic Authorization Specification for RBAC at CERN [PDF]

open access: yes, 2009
Role-based access control (RBAC) project at CERN was designed to protect from accidental and unauthorized access to the LHC and injector equipment. Our model of RBAC introduces concept of dynamic authorization.
Yastrebov, Ilia
core  

Integrating model checking with HiP-HOPS in model-based safety analysis [PDF]

open access: yes, 2014
The ability to perform an effective and robust safety analysis on the design of modern safety–critical systems is crucial. Model-based safety analysis (MBSA) has been introduced in recent years to support the assessment of complex system design by ...
Papadopoulos, Yiannis   +1 more
core   +1 more source

Chameleon sequences reveal structural effects in proteins representing micelle‐like distribution of hydrophobicity

open access: yesFEBS Open Bio, EarlyView.
Amino acids sequence of two different proteins with the same sequence (chameleon sequence—black boxes) represent in 3D structure of the proteins different secondary structures: HHHH—helical and BBB—Beta‐structural. The chains folded in water environment adopt different III‐order structures in which the chameleon fragments appear to adopt similar status
Irena Roterman   +4 more
wiley   +1 more source

Millennial Generation Optimizing Organizational Commitment with Internal Communication

open access: yesJurnal Pendidikan Ekonomi dan Bisnis (JPEB), 2021
The research focusing on expanding scientific studies to see the effect of internal communication by checking employee’s perception in keeping the company internal symmetric communication for maintaining the commitment to the company.
Widya Parimita
doaj   +1 more source

Checking account information and credit risk of bank customers [PDF]

open access: yes, 2007
We investigate if information from checking accounts may help banks to monitor the credit risk of their customers. Analyzing a unique data set with more than 3 million account-month observations from the period 2002-2006, we find that the credit line ...
Norden, Lars, Weber, Martin
core  

A Case Study on Formal Verification of Self-Adaptive Behaviors in a Decentralized System

open access: yes, 2012
Self-adaptation is a promising approach to manage the complexity of modern software systems. A self-adaptive system is able to adapt autonomously to internal dynamics and changing conditions in the environment to achieve particular quality goals.
António Ravara   +28 more
core   +2 more sources

Manipulating Models Using Internal Domain-Specific Languages [PDF]

open access: yes, 2014
International audienceIn Model-Driven Engineering, a number of external Domain-Specific Languages (DSL) for model manipulation have been proposed.
Collet, Philippe   +2 more
core   +3 more sources

Discovery and Targeted Proteomic Studies Reveal Striatal Markers Validated for Huntington's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Clinical trials for Huntington's disease (HD) enrolling persons before clinical motor diagnosis (CMD) lack validated biomarkers. This study aimed to conduct an unbiased discovery analysis and a targeted examination of proteomic biomarkers scrutinized by clinical validation. Methods Cerebrospinal fluid was obtained from PREDICT‐HD and
Daniel Chelsky   +8 more
wiley   +1 more source

Formal Analysis of Cognitive Agent Behavior: formal theoretical basis [PDF]

open access: yes, 2005
In cognitive systems the behavior of an actor (an agent) can be considered from both an external and an internal perspective. This paper contributes an automated procedure for translating a given external behavioral specification into an executable ...
Sharpanskykh, A., Treur, J.
core   +2 more sources

Home - About - Disclaimer - Privacy