Compromising Outcomes

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient compromising

Two agents have to choose one of three alternatives. Their ordinal rankings of these alternatives are commonly known among them. The rankings are diametrically opposed to each other. Ex-ante efficiency requires that they reach a compromise, that is choose the alternative which they both rank second, if and only if the sum of their von Neumann Morgenstern utilities from this alternative exceeds ...

متن کامل

Compromising a Medical Mannequin

Medical training devices are becoming increasingly dependent on technology, creating opportunities that are inherently conducive to security breaches. Previous medical device research has focused on individual device security breaches and the technical aspects involved with these breaches. This research examines the viability of breaching a production-deployed medical training mannequin. The re...

متن کامل

Airway compromising an airway.

To cite: Hoey AW, Foden N, Oakley R. BMJ Case Rep Published online: [please include Day Month Year] doi:10.1136/bcr-2016215761 DESCRIPTION There are several tracheostomy tube types that can be used by patients who present to the emergency department with temporary or long-term artificial airways. While specific knowledge of each type may not be required, it is important for the emergency physic...

متن کامل

How long can patients with renal cell carcinoma wait for surgery without compromising pathological outcomes?

INTRODUCTION Surgical wait times have been shown to be of significance in other malignancies, but limited studies exist in renal cell cancer (RCC). We analyzed surgical waiting time for RCC patients to see if there was an adverse impact on pathological characteristics. METHODS Our centre triages RCC patients on the basis of perceived tumour risk. The waiting time for surgery is adjusted stage...

متن کامل

Compromising Anonymity Using Packet Spinning

We present a novel attack targeting anonymizing systems. The attack involves placing a malicious relay node inside an anonymizing system and keeping legitimate nodes “busy.” We achieve this by creating circular circuits and injecting fraudulent packets, crafted in a way that will make them spin an arbitrary number of times inside our artificial loops. At the same time we inject a small number o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of the American Society of Nephrology

سال: 2019

ISSN: 1046-6673,1533-3450

DOI: 10.1681/asn.2019010057