Results 71 to 80 of about 6,908 (279)

Patient‐Reported Adverse Drug Events on Nirmatrelvir–Ritonavir: A Prospective Observational Study of a Pharmacist‐Led Follow‐Up and Monitoring Service

open access: yesJACCP: JOURNAL OF THE AMERICAN COLLEGE OF CLINICAL PHARMACY, EarlyView.
ABSTRACT Background There is a paucity of population‐based data on adherence and adverse drug events (ADEs) associated with the treatment of coronavirus disease 2019 (COVID‐19) with nirmatrelvir and ritonavir (NMV/r). We sought to contribute data on patient‐reported treatment adherence and ADEs with NMV/r using data collected by community pharmacists ...
Colin R. Dormuth   +4 more
wiley   +1 more source

Circuit Depth Relative to a Random Oracle

open access: yesDAIMI Report Series, 1991
<p>The study of separation of complexity classes with respect to random oracles was initiated by Bennett and Gill and continued by many other authors.</p><p> </p><p>Wilson defined relativized circuit depth and constructed various oracles A for which</p><p> </p><p> </p><ul> <li> P^A
openaire   +6 more sources

A multicenter randomized trial to improve family clinical note access and outcomes for hospitalized children: The Bedside Notes study protocol

open access: yesJournal of Hospital Medicine, EarlyView.
Abstract Introduction The 2021 Cures Act mandates caregiver access to their child′s medical notes with few exceptions, yet fewer than 10% access notes during hospitalization. Caregiver review of real‐time notes facilitates identification of safety concerns and may enhance patient safety in pediatric hospitals. This trial will evaluate the Bedside Notes
Casey O'Hare   +14 more
wiley   +1 more source

Random Oracles with(out) Programmability [PDF]

open access: yes, 2010
This paper investigates the Random Oracle Model (ROM) feature known as programmability, which allows security reductions in the ROM to dynamically choose the range points of an ideal hash function. This property is interesting for at least two reasons: first, because of its seeming artificiality (no standard model hash function is known to support such
Anja Lehmann   +5 more
openaire   +2 more sources

Knowledge Gradient Procedure to Select the Best System Under Pairwise Comparisons

open access: yesNaval Research Logistics (NRL), EarlyView.
ABSTRACT This article considers fixed‐budget ranking and selection (R&S) problems where the performance of alternative designs can only be assessed through pairwise comparisons, a setting encountered in many applications, including player ranking in games, sports tournaments, recommender systems, image‐based search, public choice models such as voting ...
Dongyang Li   +4 more
wiley   +1 more source

Leveled Certificateless Fully Homomorphic Encryption Schemes From Learning With Errors

open access: yesIEEE Access, 2020
Fully homomorphic encryption (FHE) is a form of public-key encryption that allows the computation of arbitrary functions on encrypted data without decrypting the data. As a result, it is a useful tool with numerous applications.
Mingxiang Li
doaj   +1 more source

On the Complexity of the Bilevel Shortest Path Problem

open access: yesNetworks, EarlyView.
ABSTRACT We introduce a new bilevel version of the classic shortest path problem and completely characterize its computational complexity with respect to several problem variants. In our problem, the leader and the follower each control a subset of the edges of a graph and together aim at building a path between two given vertices, while each of the ...
Dorothee Henke, Lasse Wulf
wiley   +1 more source

Inter‐population variation in demographic responses to environmental changes: insights from four seabird populations

open access: yesOikos, EarlyView.
The variability in responses to environmental change between populations remains poorly quantified and understood. This shortcoming has major consequences, as variation and flexibility of life‐history traits between populations contribute to the estimation of the adaptive potential, which is necessary for predicting the responses of interconnected ...
Camille Schatz   +5 more
wiley   +1 more source

On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services

open access: yesIEEE Access, 2017
Secure and efficient lightweight user authentication protocol for mobile cloud computing becomes a paramount concern due to the data sharing using Internet among the end users and mobile devices.
Sandip Roy   +5 more
doaj   +1 more source

Stories of coexistence: A narrative inquiry of leopard attacks on people

open access: yesPeople and Nature, EarlyView.
Abstract Pursuing human–wildlife coexistence is particularly challenging for carnivore species as conflict can negatively impact human livelihood and well‐being. Understanding the social context of how communities perceive conflicts with carnivores, often witnessed in their folklore and stories, can shed light on pathways for fostering coexistence.
Shweta Shivakumar   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy