The Button

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The MEDLINE Button.

We have developed a computerized method for performing bibliographic searches directly from patient data involving five steps: 1) identifying specific patient data which raises a question in the mind of the user, 2) selection (from a list of generic questions) of a small number of questions which fit the selected patient data, 3) automated translation of the patient data into appropriate terms ...

متن کامل

Demystifying the Search Button

A thorough review of the literature is the basis of all research and evidence-based practice. A gold-standard efficient and exhaustive search strategy is needed to ensure all relevant citations have been captured and that the search performed is reproducible. The PubMed database comprises both the MEDLINE and non-MEDLINE databases. MEDLINE-based search strategies are robust but capture only 89%...

متن کامل

Button-enabled Device Pairing

Secure initial pairing of electronic gadgets is a challenging problem, especially considering lack of any common security infrastructure. The main security issue is the threat of so-called Man-in-the-Middle (MiTM) attacks, whereby an attacker inserts itself into the pairing protocol by impersonating one of the legitimate parties. A number of interesting techniques have been proposed, all of whi...

متن کامل

Septal Button Insertion

INTRODUCTION Nasal septal perforation has a variety of causes, and patients can present with a range of symptoms. Symptomatic patients are first treated by regular nasal douching, as this simple measure settles the symptoms in most cases. Those who require surgery are offered occlusion of the perforation using prosthesis or a surgical procedure. Patients are managed with a septal button if they...

متن کامل

Button-enabled Device Association

Secure initial pairing of electronic gadgets is a challenging problem because of the usual lack of a common security infrastructure and the threat of so-called Man-in-theMiddle (MiTM) attacks, whereby an attacker inserts itself into the pairing protocol by impersonating one of the legitimate parties. A number of interesting techniques have been proposed, all of which involve the user in the pai...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Neurology

سال: 2007

ISSN: 0028-3878,1526-632X

DOI: 10.1212/01.wnl.0000268251.87299.70