The Demanding Patient Revisited
نویسندگان
چکیده
منابع مشابه
The Demanding Patient Revisited.
patients with CUP are needed. We thank Varghese and Saltz from Memorial Sloan Kettering Cancer Center for their comments concerning the definition of “actionability” in the setting of cancer presenting as CUP. Also, inresponsetoVargheseandSaltz,TTF1-positivetumors withEML4-ALK fusionscharacteristicofnon–small-cell lungcancerwerenot includedinourseries.Onecase inourseriesdidfeatureaTMPRSS-ERG fu...
متن کاملThe Myth of the Demanding Patient.
In this issue of JAMA Oncology, Gogineni and colleagues report on their empirical inquiry into patient demands,1 a nemesis that proves to be more mythical than real. The study hypothesis—thatpatientdemands for treatmentsandscansdrove unnecessarycosts—was spectacularly unconfirmed when using data collected from physicians themselves. Only 8% of the patient-physician encounters at 3 cancer center...
متن کاملEditorial: Patient safety revisited
Once again a recent article in The New York Times(1) has caused angst in the medical physics community because of what appeared to have been incorrect delivery of radiation. Following reporting of the incident, many email messages appeared on list servers written by medical physicists responding to this incident. One of the most vocal of these individuals has been Howard I. Amols, PhD, Chief, C...
متن کاملQUICKSELECT Revisited
We give an overview of the running time analysis of the random divide-and-conquer algorithm FIND or QUICKSELECT. The results concern moments, distribution of FIND’s running time, the limiting distribution, a stochastic bound and the key: a stochastic fixed point equation.
متن کاملMemory-Demanding Password Scrambling
Most of the common password scramblers hinder passwordguessing attacks by “key stretching”, e.g., by iterating a cryptographic hash function many times. With the increasing availability of cheap and massively parallel off-the-shelf hardware, iterating a hash function becomes less and less useful. To defend against attacks based on such hardware, one can exploit their limitations regarding to th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: JAMA Oncology
سال: 2015
ISSN: 2374-2437
DOI: 10.1001/jamaoncol.2015.1105