Results 41 to 50 of about 2,383,360 (354)
Protecting web services with service oriented traceback architecture [PDF]
Service oriented architecture (SOA) is a way of reorganizing software infrastructure into a set of service abstracts. In the area of applying SOA to Web service security, there have been some well defined security dimensions.
Chonka, Ashley +2 more
core +2 more sources
ABSTRACT The pediatric hematology‐oncology fellowship training curriculum has not substantially changed since its inception. The first year of training is clinically focused, and the second and third years are devoted to scholarship. However, this current structure leaves many fellows less competitive in the current job market, resulting in ...
Scott C. Borinstein +3 more
wiley +1 more source
Expressing Veracity Reserve in the Secret Service Records of the Polish People’s Republic and the People’s Republic of Bulgaria (on the Example of the CHS Bolek and CHS Sabina Files) The analysis of the language of the security service employees in ...
Julia Mazurkiewicz-Sułkowska
doaj +1 more source
Psychosocial Outcomes in Patients With Endocrine Tumor Syndromes: A Systematic Review
ABSTRACT Introduction The combination of disease manifestations, the familial burden, and varying penetrance of endocrine tumor syndromes (ETSs) is unique. This review aimed to portray and summarize available data on psychosocial outcomes in patients with ETSs and explore gaps and opportunities for future research and care.
Daniël Zwerus +6 more
wiley +1 more source
Legislative Alert: Rokita Amendment [PDF]
[Excerpt] The AFL-CIO urges you to oppose the Rokita Amendment to the Homeland Security bill that would deny basic collective bargaining rights to Transportation Security Officers (TSOs). The Rokita Amendment would single out TSOs from among the hundreds
Samuel, William
core +1 more source
Service Level Agreement-based GDPR Compliance and Security assurance in (multi)Cloud-based systems [PDF]
Compliance with the new European General Data Protection Regulation (Regulation (EU) 2016/679) and security assurance are currently two major challenges of Cloud-based systems.
Dominiak, Jacek +8 more
core +2 more sources
ABSTRACT Introduction We developed MedSupport, a multilevel medication adherence intervention designed to address root barriers to medication adherence. This study sought to explore the feasibility and acceptability of the MedSupport intervention strategies to support a future full‐scale randomized controlled trial.
Elizabeth G. Bouchard +8 more
wiley +1 more source
Developmental Disorders in Children Recently Diagnosed With Cancer
ABSTRACT Neurocognitive deficits in adult survivors of childhood cancer are well established, but less is known about developmental disorders (DD) arising shortly after cancer diagnosis. Using 2016–2019 linked Ohio cancer registry and Medicaid data, we compared DD among 324 children with cancer and 606,913 cancer‐free controls.
Jamie Shoag +5 more
wiley +1 more source
В статье разработано вычислительно эффективное алгоритмическое решение задачи оптимальной нелинейной фильтрации оценок информационного воздействия в обобщенной стохастической модели информационного противоборства.
Ivan Polansky, Kirill Loginov
doaj +1 more source
Analog and digital plain old telephony service (POTS) is increasingly replaced by technologies that integrate voice, data, and video communication services. The integrated services digital network (ISDN) offers the embedding of this advanced multimedia communication into the subscriber loop.
Herbert Leitold +2 more
openaire +1 more source

