Results 61 to 70 of about 532,868 (319)
The AADL Constraint Annex [PDF]
The SAE Architecture Analysis and Design Language -- AADL has been defined with a strong focus on the careful modeling of critical real-time embedded systems. Around this formalism, several analysis tools have been defined, e.g.
Gheoghe, Serban, Hugues, Jérôme
core
Revising Z: part I - logic and semantics [PDF]
This is the first of two related papers. We introduce a simple specification logic ZC comprising a logic and a semantics (in ZF set theory) within which the logic is sound.
Henson, Martin C., Reeves, Steve
core +3 more sources
CSF Biomarker‐Based Cognitive Trajectories in Parkinson's Disease‐Subjective Cognitive Decline
ABSTRACT Objective Cognitive complaints without objective cognitive impairment in Parkinson's Disease, termed Parkinson's Disease‐Subjective Cognitive Decline (PD‐SCD), have been associated with cognitive decline. However, its progression is heterogeneous, highlighting the need for improved identification of patients at greater risk for deterioration ...
Jon Rodriguez‐Antiguedad+7 more
wiley +1 more source
A reusability-oriented use-case model specification language [PDF]
Bogumiła Hnatkowska, Piotr Zabawa
doaj +1 more source
Representation and processing of mass and count nouns: A review.
Comprehension and/or production of noun phrases and sentences requires the selection of lexical-syntactic attributes of nouns. These lexical-syntactic attributes include grammatical gender (masculine/feminine/neuter), number (singular/plural) and ...
Nora eFieder+2 more
doaj +1 more source
Bias Specification Language [PDF]
In learning approaches based on graphical models or neural networks, whenever the user provides the graph structure of the model, he or she is specifying a bias. The “language” used to specify this bias, in this case, consists of graphs. Figure 1 shows examples of such graphs.
openaire +2 more sources
Sound and Complete Runtime Security Monitor for Application Software [PDF]
Conventional approaches for ensuring the security of application software at run-time, through monitoring, either produce (high rates of) false alarms (e.g. intrusion detection systems) or limit application performance (e.g. run-time verification).
Khan, Muhammad Taimoor+2 more
core +1 more source
Z2SAL: a translation-based model checker for Z [PDF]
Despite being widely known and accepted in industry, the Z formal specification language has not so far been well supported by automated verification tools, mostly because of the challenges in handling the abstraction of the language.
Anthony J. H. Simons+10 more
core +1 more source
Precision‐Optimised Post‐Stroke Prognoses
ABSTRACT Background Current medicine cannot confidently predict who will recover from post‐stroke impairments. Researchers have sought to bridge this gap by treating the post‐stroke prognostic problem as a machine learning problem, reporting prediction error metrics across samples of patients whose outcomes are known.
Thomas M. H. Hope+4 more
wiley +1 more source
ABSTRACT Objectives To investigate whether pulse pressure or mean arterial pressure mediates the relationship between age and white matter hyperintensity load and to examine the mediating effect of white matter hyperintensities on cognition. Methods Demographic information, blood pressure, current medication lists, and Montreal Cognitive Assessment ...
Jade Hannan+8 more
wiley +1 more source