Evaluating treatment protocols using data combination
نویسندگان
چکیده
منابع مشابه
Evaluating treatment protocols to prevent antibiotic resistance.
The spread of bacteria resistant to antimicrobial agents calls for population-wide treatment strategies to delay or reverse the trend toward antibiotic resistance. Here we propose new criteria for the evaluation of the population-wide effects of treatment protocols for directly transmitted bacterial infections and discuss different usage patterns for single and multiple antibiotic therapy. A ma...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولevaluating adaptability of set protocols using colored petri nets
secure electronic transaction (set) protocol is an open protocol, which has the potential to emerge as a powerful tool in securing of electronic transactions. the quality of a design of an ecommerce protocols has a great influence on achieving non-functional requirements (nfrs) to the system. an increasingly important non-functional attribute of complex software systems is adaptability. softwar...
متن کاملEvaluating Cryptographic Protocols
Cryptographic Protocol (CP) analysis is a topic of intense research. Meadows describes four approaches for CP verification under investigation in [MEA92] and several authors have categorized protocols based on types of errors they are subject to [BIRD92], [SYV93a],[SYV93b]. This paper addresses the weakness injected into protocols when information is passed in the clear or encrypted only under ...
متن کاملEvaluating Distributed Checkpointing Protocols
A large number of distributed checkpointing protocols appear in the literature. However , in order to be able to make informed decisions about which protocol performs best for a given environment, one must use an objective measure to compare between them. This paper presents an objective measure , called overhead ratio, for evaluating distributed checkpointing protocols. This measure extends pr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Econometrics
سال: 2013
ISSN: 0304-4076
DOI: 10.1016/j.jeconom.2012.11.003