Zobrazeno 1 - 10
of 137
pro vyhledávání: '"Bruce W. Watson"'
Autor:
Etheresia Pretorius, Chantelle Venter, Gert Jacobus Laubscher, Maritha J Kotze, Sunday O. Oladejo, Liam R. Watson, Kanshu Rajaratnam, Bruce W. Watson, Douglas B. Kell
Publikováno v:
Cardiovascular Diabetology, Vol 21, Iss 1, Pp 1-17 (2022)
Abstract Background Fibrin(ogen) amyloid microclots and platelet hyperactivation previously reported as a novel finding in South African patients with the coronavirus 2019 disease (COVID-19) and Long COVID/Post-Acute Sequelae of COVID-19 (PASC), migh
Externí odkaz:
https://doaj.org/article/b8608fa6b83f456a8805dba7562e5591
Autor:
Sunday O. Oladejo, Liam R. Watson, Bruce W. Watson, Kanshukan Rajaratnam, Maritha J. Kotze, Douglas B. Kell, Etheresia Pretorius
Publikováno v:
South African Journal of Science, Vol 119, Iss 5/6 (2023)
‘Long COVID’ is the term used to describe the phenomenon in which patients who have survived a COVID-19 infection continue to experience prolonged SARS-CoV-2 symptoms. Millions of people across the globe are affected by Long COVID. Solving the Lo
Externí odkaz:
https://doaj.org/article/bd3dfa586aff430bb050a0528d0040d2
Autor:
Siti M. Kabanda, Nezerith Cengiz, Kanshukan Rajaratnam, Bruce W. Watson, Qunita Brown, Tonya M. Esterhuizen, Keymanthri Moodley
Publikováno v:
South African Journal of Science, Vol 119, Iss 5/6 (2023)
The data ecosystem is complex and involves multiple stakeholders. Researchers and scientists engaging in data-intensive research collect, analyse, store, manage and share large volumes of data. Consequently, capturing researchers’ and scientists’
Externí odkaz:
https://doaj.org/article/2a33d14d880a4beeba8015f3fe86cd9d
Publikováno v:
South African Computer Journal, Vol 0, Iss 53 (2014)
In indexing of, and pattern matching on, DNA and text sequences, it is often important to represent all factors of a sequence. One efficient, compact representation is the factor oracle (FO). At the same time, any classical deterministic finite autom
Externí odkaz:
https://doaj.org/article/99ad3d8441744274bd6ef6ceca131c1b
Autor:
Keymanthri Moodley, Tonya M.n Esterhuize, Qunita Brown, Bruce W. Watson, Kanshukan Rajaratnam, Nezerith Cengiz, Siti M. Kabanda
Publikováno v:
South African Journal of Science; Vol. 119 No. 5-6 (2023)
The data ecosystem is complex and involves multiple stakeholders. Researchers and scientists engaging in data-intensive research collect, analyse, store, manage and share large volumes of data. Consequently, capturing researchers’ and scientists’
Autor:
Etheresia Pretorius, Douglas B. Kell, Maritha J. Kotze, Kanshukan Rajaratnam, Bruce W. Watson, Liam R. Watson, Sunday O. Oladejo
Publikováno v:
South African Journal of Science; Vol. 119 No. 5-6 (2023)
‘Long COVID’ is the term used to describe the phenomenon in which patients who have survived a COVID-19 infection continue to experience prolonged SARS-CoV-2 symptoms. Millions of people across the globe are affected by Long COVID. Solving the Lo
Publikováno v:
Data Mining and Machine Learning.
Contract Driven Development formalizes functional requirements within component contracts. The process aims to produce higher quality software, reduce quality assurance costs and improve reusability. However, the perceived complexity and cost of requ
Autor:
Dunn, Peter M, Bruce W. Watson
Publikováno v:
The SHAFR Guide Online
Externí odkaz:
https://doi.org/10.1163/2468-1733_shafr_SIM190140099
Autor:
Tabea Bordis, Loek Cleophas, Alexander Kittelmann, Tobias Runge, Ina Schaefer, Bruce W. Watson
Publikováno v:
The Logic of Software. A Tasting Menu of Formal Methods ISBN: 9783031081651
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4d70470b528796a266e49efd77c85a26
https://doi.org/10.1007/978-3-031-08166-8_5
https://doi.org/10.1007/978-3-031-08166-8_5
Autor:
Bruce W. Watson, Ina Schaefer, Loek Cleophas, Derrick G. Kourie, Alexander Knüppel, Tobias Runge
Publikováno v:
ACM SIGAda Ada Letters. 38:64-68
In many software applications, it is necessary to preserve confidentiality of information. Therefore, security mechanisms are needed to enforce that secret information does not leak to unauthorized users. However, most language-based techniques that