Results 71 to 80 of about 1,133,638 (315)
Teaching Model Checking to Undergraduates
The way program verification is taught in our faculty is firstly described. One of the verification methods is model checking, shortly presented to the students in one lecture. One laboratory project consists in using the SPIN tool.
Andreea Vescan, Militon Frentiu
doaj
Genomics‐led approach to drug testing in models of undifferentiated pleomorphic sarcoma
GA text Genomic data from undifferentiated pleomorphic sarcoma patients and preclinical models were used to inform a targeted drug screen. Selected compounds were tested in 2D and 3D cultures of UPS cell lines. A combination of trametinib and infigratinib was synergistic in the majority of UPS cell lines tested, which was further confirmed in an ex ...
Piotr J. Manasterski+19 more
wiley +1 more source
We consider the case where inconsistencies are present between a system and its corresponding model, used for automatic verification. Such inconsistencies can be the result of modeling errors or recent modifications of the system. Despite such discrepancies we can still attempt to perform automatic verification.
Doron Peled+2 more
openaire +2 more sources
Model checking of trusted cryptographic module
The formal security analysis was given for the trusted cryptographic module according to the specification of the trusted cryptographic module using model checking tools. The flaws in the AP protocol were pointed and the solution was given.
CHEN Xiao-feng, FENG Deng-guo
doaj +2 more sources
Formal Verification of Code Conversion: A Comprehensive Survey
Code conversion, encompassing translation, optimization, and generation, is becoming increasingly critical in information systems and the software industry.
Amira T. Mahmoud+7 more
doaj +1 more source
Overexpression of CHRDL2 in colon cancer cells makes them more stem‐like and resistant to chemo‐ and radiotherapy. CHRDL2‐high cells have upregulation of the WNT pathway, genes involved in the DNA damage response (DDR) pathway and epithelial‐to‐mesenchymal transition (EMT). This leads to quicker repair of damaged DNA and more cell migration.
Eloise Clarkson, Annabelle Lewis
wiley +1 more source
Efficient Parallel Path Checking for Linear-Time Temporal Logic With Past and Bounds [PDF]
Path checking, the special case of the model checking problem where the model under consideration is a single path, plays an important role in monitoring, testing, and verification. We prove that for linear-time temporal logic (LTL), path checking can be
Finkbeiner, Bernd, Kuhtz, Lars
core +1 more source
Model Checking Quantitative Hyperproperties [PDF]
Hyperproperties are properties of sets of computation traces. In this paper, we study quantitative hyperproperties, which we define as hyperproperties that express a bound on the number of traces that may appear in a certain relation. For example, quantitative non-interference limits the amount of information about certain secret inputs that is leaked ...
Finkbeiner, Bernd+2 more
openaire +3 more sources
Model Checking Spatial Logics for Closure Spaces [PDF]
Spatial aspects of computation are becoming increasingly relevant in Computer Science, especially in the field of collective adaptive systems and when dealing with systems distributed in physical space. Traditional formal verification techniques are well
Vincenzo Ciancia+3 more
doaj +1 more source
TRIM24 and TRIM28 are androgen receptor (AR) coregulators which exhibit increased expression with cancer progression. Both TRIM24 and TRIM28 combine to influence the response of castrate‐resistant prostate cancer (CRPC) cells to AR inhibitors by mediating AR signalling, regulation of MYC and upregulating VEGF to promote angiogenesis. Castrate‐resistant
Damien A. Leach+8 more
wiley +1 more source