Zobrazeno 1 - 10
of 47
pro vyhledávání: '"Rahma Ben Ayed"'
Autor:
Carlo Cattrini, Marcello Manfredi, Paola Barboro, Marco Ghirimoldi, Alessia Mennitto, Veronica Martini, Alessio Battioni, Marco Le Van, Simone Gobbato, Carmen Branni, Rahma Ben Ayed, David James Pinato, Fabio Catalano, Elisa Zanardi, Francesco Boccardo, Alessandra Gennari
Publikováno v:
Scientific Reports, Vol 13, Iss 1, Pp 1-10 (2023)
Abstract Emerging evidence highlights the potential prognostic relevance of circulating lipids in metastatic castration-resistant prostate cancer (mCRPC), with a proposed 3-lipid signature. This study aims to analyze the lipidomic profiles of individ
Externí odkaz:
https://doaj.org/article/1b1cebe48fc64c2f8ca1ec5827bdd380
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031311079
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f0062dc25e90a52c8b44419ac61b7778
https://doi.org/10.1007/978-3-031-31108-6_12
https://doi.org/10.1007/978-3-031-31108-6_12
Autor:
Veronica Martini, Arianna Stella, Rahma Ben Ayed, Carmen Branni, Andrea Tassone, Nazanin Keivan, Chiara Saggia, Francesca D'Avanzo, Valentina Rossi, Francesca Platini, Incoronata Romaniello, Elena Giacobino, Valentina Guarneri, Renzo Luciano Boldorini, Francesca Mercalli, Ivan Dodaro, Anna Gambaro, David James Pinato, Alessandra Gennari
Publikováno v:
Cancer Research. 83:2174-2174
BackgroundEvaluation of extracellular vescicles (EVs) has been identified as a potential predictive biomarker in patients treated with IO. In particular, Glypican-1 (GPC-1), was reported to be abnormally expressed in BC tissues and GPC-1+ EVs resulte
Publikováno v:
Theoretical Aspects of Software Engineering ISBN: 9783031103629
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3bede3afa209ad91ff026bdaee584b3a
https://doi.org/10.1007/978-3-031-10363-6_18
https://doi.org/10.1007/978-3-031-10363-6_18
Publikováno v:
journal of communications
journal of communications, 2019, 14 (10), pp980-986. ⟨10.12720/jcm.14.10.980-986⟩
journal of communications, 2019, 14 (10), pp980-986. ⟨10.12720/jcm.14.10.980-986⟩
The verification of safety properties of critical systems, such as railway signaling systems, is better achieved by formal reasoning. Event-B as a formal method, allows to get safe and reliable systems. Nevertheless, modeling with Event-B method requ
Security in mobile wireless sensor networks is a big challenge because it adds more complexity to the network in addition to the problems of mobility and the limited sensor node resources. Even with authentication and encryption mechanisms, an attack
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6fc4ec44988b5e2615066f2e37aace62
https://doi.org/10.4018/978-1-7998-2454-1.ch027
https://doi.org/10.4018/978-1-7998-2454-1.ch027
Autor:
Philippe Bon, Simon Collart-Dutilleul, Joris Rehm, Dorian Petit, Rahma Ben Ayed, Kenza Kraibi
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030549961
FM Workshops (2)
FM Workshops (2)
Refinement consists of detailing the specification in order to get a more concrete model. However, this technique leads to large models. Hence, model decomposition is used to reduce model complexity. In this paper, we present the main methods of deco
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::eda2e3d793be010a93f56ebb02cb014c
https://doi.org/10.1007/978-3-030-54997-8_23
https://doi.org/10.1007/978-3-030-54997-8_23
Publikováno v:
Fuzzy Sets and Systems. 348:50-74
Massive data can create a real competitive advantage for the companies; it is used to better respond to customers, to follow the behavior of consumers, to anticipate the evolutions, etc. However, it has its own deficiencies. This data volume not only
Publikováno v:
International Journal of Service Science, Management, Engineering, and Technology. 8:60-78
Cloud computing is increasingly used so that the number of providers offering services is rapidly increasing. Thus, a need to organize these services and to express relations between them arises. To answer this need, ontologies are used. To query the
Publikováno v:
International Journal on Semantic Web and Information Systems. 13:22-47
Security in mobile wireless sensor networks is a big challenge because it adds more complexity to the network in addition to the problems of mobility and the limited sensor node resources. Even with authentication and encryption mechanisms, an attack