Results 31 to 40 of about 5,550,853 (286)

Using protocol analysis to explore the creative requirements engineering process

open access: yes, 2006
Protocol analysis is an empirical method applied by researchers in cognitive psychology and behavioural analysis. Protocol analysis can be used to collect, document and analyse thought processes by an individual problem solver.
Nguyen, Lemai, Shanks, Graeme
core   +2 more sources

Modeling Adversaries in a Logic for Security Protocol Analysis [PDF]

open access: yes, 2012
Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which considers only adversaries that can compose and replay messages, and ...
Halpern, Joseph Y., Pucella, Riccardo
core   +1 more source

A Quality Improvement Initiative to Standardize Pneumocystis jirovecii Pneumonia Prophylaxis in Pediatric Patients With Solid Tumors

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Pediatric patients with extracranial solid tumors (ST) receiving chemotherapy are at an increased risk for Pneumocystis jirovecii pneumonia (PJP). However, evidence guiding prophylaxis practices in this population is limited. A PJP‐related fatality at our institution highlighted inconsistent prescribing approaches and concerns about
Kriti Kumar   +8 more
wiley   +1 more source

Sickle Cell Disease Is an Inherent Risk for Asthma in a Sibling Comparison Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction Sickle cell disease (SCD) and asthma share a complex relationship. Although estimates vary, asthma prevalence in children with SCD is believed to be comparable to or higher than the general population. Determining whether SCD confers an increased risk for asthma remains challenging due to overlapping symptoms and the ...
Suhei C. Zuleta De Bernardis   +9 more
wiley   +1 more source

Finite-key analysis on the 1-decoy state QKD protocol

open access: yes, 2018
It has been shown that in the asymptotic case of infinite-key length the 2-decoy state QKD protocol outperforms the 1-decoy state protocol. Here, we present a finite-key analysis of the 1-decoy method.
Boaron, Alberto   +4 more
core   +2 more sources

Personalizing the Pediatric Hematology/Oncology Fellowship: Adapting Training for the Next Generation

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT The pediatric hematology‐oncology fellowship training curriculum has not substantially changed since its inception. The first year of training is clinically focused, and the second and third years are devoted to scholarship. However, this current structure leaves many fellows less competitive in the current job market, resulting in ...
Scott C. Borinstein   +3 more
wiley   +1 more source

Cognitive abilities and superior decision making under risk [PDF]

open access: yesJudgment and Decision Making, 2009
Individual differences in cognitive abilities and skills can predict normatively superior and logically consistent judgments and decisions. The current experiment investigates the processes that mediate individual differences in risky choices.
Edward T. Cokely, Colleen M. Kelley
doaj  

Improved Soundness for QMA with Multiple Provers [PDF]

open access: yes, 2013
We present three contributions to the understanding of QMA with multiple provers: 1) We give a tight soundness analysis of the protocol of [Blier and Tapp, ICQNM '09], yielding a soundness gap Omega(1/N^2).
Chiesa, Alessandro, Forbes, Michael A.
core   +1 more source

Psychosocial Outcomes in Patients With Endocrine Tumor Syndromes: A Systematic Review

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction The combination of disease manifestations, the familial burden, and varying penetrance of endocrine tumor syndromes (ETSs) is unique. This review aimed to portray and summarize available data on psychosocial outcomes in patients with ETSs and explore gaps and opportunities for future research and care.
Daniël Zwerus   +6 more
wiley   +1 more source

The Three-Step Test-Interview (TSTI): An observation-based method for pretesting self-completion questionnaires

open access: yesSurvey Research Methods, 2008
Three-Step Test-Interview (TSTI) is a method for pretesting a self-completion questionnaire by first observing actual instances of interaction between the instrument and respondents (the response process) before exploring the reasons for this behavior ...
Tony Hak   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy