Evaluating treatment protocols using data combination

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evaluating treatment protocols to prevent antibiotic resistance.

The spread of bacteria resistant to antimicrobial agents calls for population-wide treatment strategies to delay or reverse the trend toward antibiotic resistance. Here we propose new criteria for the evaluation of the population-wide effects of treatment protocols for directly transmitted bacterial infections and discuss different usage patterns for single and multiple antibiotic therapy. A ma...

متن کامل

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

evaluating adaptability of set protocols using colored petri nets

secure electronic transaction (set) protocol is an open protocol, which has the potential to emerge as a powerful tool in securing of electronic transactions. the quality of a design of an ecommerce protocols has a great influence on achieving non-functional requirements (nfrs) to the system. an increasingly important non-functional attribute of complex software systems is adaptability. softwar...

متن کامل

Evaluating Cryptographic Protocols

Cryptographic Protocol (CP) analysis is a topic of intense research. Meadows describes four approaches for CP verification under investigation in [MEA92] and several authors have categorized protocols based on types of errors they are subject to [BIRD92], [SYV93a],[SYV93b]. This paper addresses the weakness injected into protocols when information is passed in the clear or encrypted only under ...

متن کامل

Evaluating Distributed Checkpointing Protocols

A large number of distributed checkpointing protocols appear in the literature. However , in order to be able to make informed decisions about which protocol performs best for a given environment, one must use an objective measure to compare between them. This paper presents an objective measure , called overhead ratio, for evaluating distributed checkpointing protocols. This measure extends pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Econometrics

سال: 2013

ISSN: 0304-4076

DOI: 10.1016/j.jeconom.2012.11.003