The Demanding Patient Revisited

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Demanding Patient Revisited.

patients with CUP are needed. We thank Varghese and Saltz from Memorial Sloan Kettering Cancer Center for their comments concerning the definition of “actionability” in the setting of cancer presenting as CUP. Also, inresponsetoVargheseandSaltz,TTF1-positivetumors withEML4-ALK fusionscharacteristicofnon–small-cell lungcancerwerenot includedinourseries.Onecase inourseriesdidfeatureaTMPRSS-ERG fu...

متن کامل

The Myth of the Demanding Patient.

In this issue of JAMA Oncology, Gogineni and colleagues report on their empirical inquiry into patient demands,1 a nemesis that proves to be more mythical than real. The study hypothesis—thatpatientdemands for treatmentsandscansdrove unnecessarycosts—was spectacularly unconfirmed when using data collected from physicians themselves. Only 8% of the patient-physician encounters at 3 cancer center...

متن کامل

Editorial: Patient safety revisited

Once again a recent article in The New York Times(1) has caused angst in the medical physics community because of what appeared to have been incorrect delivery of radiation. Following reporting of the incident, many email messages appeared on list servers written by medical physicists responding to this incident. One of the most vocal of these individuals has been Howard I. Amols, PhD, Chief, C...

متن کامل

QUICKSELECT Revisited

We give an overview of the running time analysis of the random divide-and-conquer algorithm FIND or QUICKSELECT. The results concern moments, distribution of FIND’s running time, the limiting distribution, a stochastic bound and the key: a stochastic fixed point equation.

متن کامل

Memory-Demanding Password Scrambling

Most of the common password scramblers hinder passwordguessing attacks by “key stretching”, e.g., by iterating a cryptographic hash function many times. With the increasing availability of cheap and massively parallel off-the-shelf hardware, iterating a hash function becomes less and less useful. To defend against attacks based on such hardware, one can exploit their limitations regarding to th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: JAMA Oncology

سال: 2015

ISSN: 2374-2437

DOI: 10.1001/jamaoncol.2015.1105