Results 71 to 80 of about 251,382 (296)
Treatment Decision‐Making Roles and Preferences Among Adolescents and Young Adults With Cancer
ABSTRACT Background Decision‐making (DM) dynamics between adolescents and young adults (AYAs) with cancer, parents, and oncologists remain underexplored in diverse populations. We examined cancer treatment DM preferences among an ethnically and socioeconomically diverse group of AYAs and their parents.
Amanda M. Gutierrez +14 more
wiley +1 more source
A trustworthy mobile agent infrastructure for network management [PDF]
Despite several advantages inherent in mobile-agent-based approaches to network management as compared to traditional SNMP-based approaches, industry is reluctant to adopt the mobile agent paradigm as a replacement for the existing manager-agent model ...
Koliousis, A., Sventek, J.S.
core +1 more source
ABSTRACT Background Parents of children treated for acute lymphoblastic leukemia (ALL) often experience significant caregiver burden and disruption to their well‐being. While parent quality of life (QoL) during treatment is well characterized, little is known about outcomes during early survivorship.
Sara Dal Pra +3 more
wiley +1 more source
The Security model of the ALICE next generation Grid framework [PDF]
JAliEn (Java-AliEn) is the ALICE next generation Grid framework which will be used for the top-level distributed computing resources management during the LHC Run 3 and onward.
Martinez Pedreira Miguel +3 more
doaj +1 more source
A Generic Framework for Context-Based Distributed Authorizations [PDF]
In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and off for denying access. This access policy is principally based on the user’s identity and is static over time.
Kouadri Mostéfaoui, Ghita +1 more
openaire +2 more sources
Distributed Access Control for Web and Business Processes [PDF]
Middleware influenced the research community in developing a number of systems for controlling access to distributed resources. Nowadays a new paradigm for the lightweight integration of business resources from different partners is starting to take hold
Koshutanski, Hristo
core
Citizen Electronic Identities using TPM 2.0
Electronic Identification (eID) is becoming commonplace in several European countries. eID is typically used to authenticate to government e-services, but is also used for other services, such as public transit, e-banking, and physical security access ...
Asokan, N. +2 more
core +1 more source
ABSTRACT Purpose Cognitive and psychological difficulties could negatively interfere with treatment adherence and quality of life before and after hematopoietic stem cell transplant (HSCT). Methods to mitigate these changes may have positive effects on treatment success.
Kristen L. Votruba +11 more
wiley +1 more source
Authorization Strategies for Grid Security: Attribute-Based Multipolicy Access Control (ABMAC) Model [PDF]
The emergence of Grid computing technology is being followed by three main security concerns: the independence of the domains where the resource providers (RPs) are situated; the need for supporting different security policies andthe non-necessity of the
Katerina RISTOSKA
core
ABSTRACT A second allogeneic (allo‐)hematopoietic stem cell transplantation (HSCT2) is a potential curative option for pediatric patients with acute lymphoblastic leukemia (ALL) following relapse after first allogeneic transplantation (HSCT1), but its efficacy is limited by high relapse rates and transplant‐related toxicity in highly pretreated ...
Ava Momm +10 more
wiley +1 more source

