Results 61 to 70 of about 532,868 (319)

The AADL Constraint Annex [PDF]

open access: yes, 2013
The SAE Architecture Analysis and Design Language -- AADL has been defined with a strong focus on the careful modeling of critical real-time embedded systems. Around this formalism, several analysis tools have been defined, e.g.
Gheoghe, Serban, Hugues, Jérôme
core  

Revising Z: part I - logic and semantics [PDF]

open access: yes, 1999
This is the first of two related papers. We introduce a simple specification logic ZC comprising a logic and a semantics (in ZF set theory) within which the logic is sound.
Henson, Martin C., Reeves, Steve
core   +3 more sources

CSF Biomarker‐Based Cognitive Trajectories in Parkinson's Disease‐Subjective Cognitive Decline

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Cognitive complaints without objective cognitive impairment in Parkinson's Disease, termed Parkinson's Disease‐Subjective Cognitive Decline (PD‐SCD), have been associated with cognitive decline. However, its progression is heterogeneous, highlighting the need for improved identification of patients at greater risk for deterioration ...
Jon Rodriguez‐Antiguedad   +7 more
wiley   +1 more source

A reusability-oriented use-case model specification language [PDF]

open access: yesAnnals of computer science and information systems, 2023
Bogumiła Hnatkowska, Piotr Zabawa
doaj   +1 more source

Representation and processing of mass and count nouns: A review.

open access: yesFrontiers in Psychology, 2014
Comprehension and/or production of noun phrases and sentences requires the selection of lexical-syntactic attributes of nouns. These lexical-syntactic attributes include grammatical gender (masculine/feminine/neuter), number (singular/plural) and ...
Nora eFieder   +2 more
doaj   +1 more source

Bias Specification Language [PDF]

open access: yes, 2011
In learning approaches based on graphical models or neural networks, whenever the user provides the graph structure of the model, he or she is specifying a bias. The “language” used to specify this bias, in this case, consists of graphs. Figure 1 shows examples of such graphs.
openaire   +2 more sources

Sound and Complete Runtime Security Monitor for Application Software [PDF]

open access: yes, 2016
Conventional approaches for ensuring the security of application software at run-time, through monitoring, either produce (high rates of) false alarms (e.g. intrusion detection systems) or limit application performance (e.g. run-time verification).
Khan, Muhammad Taimoor   +2 more
core   +1 more source

Z2SAL: a translation-based model checker for Z [PDF]

open access: yes, 2011
Despite being widely known and accepted in industry, the Z formal specification language has not so far been well supported by automated verification tools, mostly because of the challenges in handling the abstraction of the language.
Anthony J. H. Simons   +10 more
core   +1 more source

Precision‐Optimised Post‐Stroke Prognoses

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Current medicine cannot confidently predict who will recover from post‐stroke impairments. Researchers have sought to bridge this gap by treating the post‐stroke prognostic problem as a machine learning problem, reporting prediction error metrics across samples of patients whose outcomes are known.
Thomas M. H. Hope   +4 more
wiley   +1 more source

Pulse Pressure, White Matter Hyperintensities, and Cognition: Mediating Effects Across the Adult Lifespan

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objectives To investigate whether pulse pressure or mean arterial pressure mediates the relationship between age and white matter hyperintensity load and to examine the mediating effect of white matter hyperintensities on cognition. Methods Demographic information, blood pressure, current medication lists, and Montreal Cognitive Assessment ...
Jade Hannan   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy