Dying safely

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dying

Professor Hinton is a psychiatrist who has made careful studies of the reactions of dying people, the awareness they have that they are dying, and the ways in which their doctors and nurses may help to bring them solace. His original work is deservedly much esteemed. It has lost nothing by presentation in this volume together with additional information on the circumstances, customs and attitud...

متن کامل

Wrap Your Objects Safely

Despite the effort of researchers on distributed systems, programming languages, and security, there is still no good solution offering basic constructs for guaranteeing minimal security at the programming language level. In particular, the notion of a wrapper around an object or component controlling its interaction with the environment has not properly been addressed. This kind of “local fire...

متن کامل

Using Lithium Safely

It has been over 60 years since Australian psychiatrist John Cade first described lithium’s therapeutic role in manic illness. Cade’s seminal 1949 article described the impact of lithium salts in resolving “psychotic excitement” in 10 manic patients. Since this discovery, lithium has become a gold standard treatment for bipolar disorder, with evidence supporting its role in acute mania, depress...

متن کامل

Splitting atoms safely

The aim of this paper is to make a contribution to (compositional) development methods for concurrent programs. In particular, it takes a fresh look at a number of familiar ideas including the problem of interference. Some subtle issues of observability –including granularity– are explored. Based on these points, the paper sets out some requirements for an approach to developing systems by “spl...

متن کامل

Safely Composing Security Protocols

Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol. However even when a protocol has been proved secure, there is absolutely no guarantee if the protocol is executed in an environment where other protocols, possibly sharing some common identities and keys like public keys or l...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal for Quality in Health Care

سال: 2010

ISSN: 1353-4505,1464-3677

DOI: 10.1093/intqhc/mzq045