Results 41 to 50 of about 549,692 (299)
The identification of vulnerabilities in a mission-critical system is one of the challenges faced by a cyber-physical system (CPS). The incorporation of embedded Internet of Things (IoT) devices makes it tedious to identify vulnerability and difficult to
Vishal Sharma +4 more
doaj +1 more source
Building information modeling (BIM) technology has been utilized increasingly in quantitative ways in the architecture, engineering, and construction disciplines.
Jungsik Choi, Sejin Lee, Inhan Kim
doaj +1 more source
In this article, we study correction of spelling errors, specifically on how the spelling errors are made and how can we model them computationally in order to fix them.
Heiki-Jaan Kaalep +2 more
doaj +1 more source
We developed a cost‐effective methylation‐specific droplet digital PCR multiplex assay containing tissue‐conserved and tumor‐specific methylation markers. The assay can detect circulating tumor DNA with high accuracy in patients with localized and metastatic colorectal cancer.
Luisa Matos do Canto +8 more
wiley +1 more source
Money in monetary policy design under uncertainty: a formal characterization of ECB-style cross-checking [PDF]
The European Central Bank has assigned a special role to money in its two pillar strategy and has received much criticism for this decision. The case against including money in the central bank’s interest rate rule is based on a standard model of the ...
Beck, Günter W., Wieland, Volker
core
Monitoring circulating tumor DNA (ctDNA) in patients with operable breast cancer can reveal disease relapse earlier than radiology in a subset of patients. The failure to detect ctDNA in some patients with recurrent disease suggests that ctDNA could serve as a supplement to other monitoring approaches.
Kristin Løge Aanestad +35 more
wiley +1 more source
Grouping based calculus for propositional linear temporal logic
In this paper, the authors research the problem of loops in linear temporal logic PLTL. The task involves defining the standard rule application process for the derivation procedure (as used in [4] and [5]), determining and proving properties for the ...
Kostas Ragauskas, Adomas Birštunas
doaj +3 more sources
The LINC01116 long noncoding RNA is induced by hypoxia and associated with poor prognosis and high recurrence rates in two cohorts of lung adenocarcinoma patients. Here, we demonstrate that besides its expression in cancer cells, LINC01116 is markedly expressed in lymphatic endothelial cells of the tumor stroma in which it participates in hypoxia ...
Marine Gautier‐Isola +12 more
wiley +1 more source
Forwarding Tables Verification through Representative Header Sets [PDF]
Forwarding table verification consists in checking the distributed data-structure resulting from the forwarding tables of a network. A classical concern is the detection of loops.
Boufkhad, Yacine +5 more
core +3 more sources
The evolution of refractive status in Chinese infants during the first year of life and its affected factors [PDF]
AIM: To study the evolution of the refractive status and examine the affected factors in infants during the first year of life in a large sample size in China.
Shu-Juan Yu +6 more
doaj +1 more source

