Shades of Grey
نویسندگان
چکیده
منابع مشابه
Only 50 shades of grey?
The email from an unknown sender popped into my inbox 'Hi, we were at a conference recently and I'd like your advice ...' Something stopped me from hitting delete immediately and I read on: a Texan Professor of Family Medicine was seeking a UK GP academic to test his various hypotheses about the US healthcare system versus the rest of the world. That was 6 years and a hundred emails ago. Autumn...
متن کاملData Intensive Science: Shades of Grey
The vast majority of research output is grey; white (peer reviewed scholarly publications) forms a minor proportion. Historically, grey material was generated and used within an organisation. However, in recent years some researchrelevant grey material is being made openly available. Among grey outputs, research datasets are the largest proportion by volume and increasingly these are being made...
متن کاملNutritional quality of organic food: shades of grey or shades of green?
Consumer concern regarding possible adverse health effects of foods produced using intensive farming methods has led to considerable interest in the health benefits of organically-produced crops and animal products. There appears to be widespread perception amongst consumers that such methods result in foods of higher nutritional quality. The present review concludes that evidence that can supp...
متن کاملApplicability of pulse pressure variation: how many shades of grey?
Since its first description in 1999 [1], many studies have demonstrated the value of pulse pressure variation (PPV) as a predictor of fluid responsiveness. These studies were pooled together in a recent meta-analysis [2] concluding that PPV predicts fluid responsiveness accurately (sensitivity 88%, specificity 89%), so long as limitations to its use [3,4] are understood and respected (Figure 1).
متن کاملShades of grey: On the effectiveness of reputation-based "blacklists"
Malicious code, or malware, executed on compromised hosts provides a platform for a wide variety of attacks against the availability of the network and the privacy and confidentiality of its users. Unfortunately, the most popular techniques for detecting and preventing malware have been shown to be significantly flawed [11], and it is widely believed that a significant fraction of the Internet ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Offset
سال: 1969
ISSN: 2204-3659,1445-9418
DOI: 10.15209/offset.v0i11.373