نتایج جستجو برای: side effect

تعداد نتایج: 1808705  

2009
Michael Weiss

The patterns in this paper describe open source development practices from a performance perspective. In product development, performance is measured in terms of the time it takes to develop a software product, the resulting quality of the software, and the cost of development. These dimensions are in tension with one another. Since improving performance has side effects, we also need to includ...

2016

Minocycline is an antibiotic used increasingly in a variety of situations including MRSA infections and also known for its anti-inflammatory properties. Its side effects are usually benign and well known. We report a first of its kind case of minocycline-associated acute pancreatitis in a patient in whom all other common causes of pancreatitis were ruled out. The aim is to raise awareness about...

2006
W. Pruitt Ralph E. Kauffman Howard C. Mofenson Robert Roberts Barry H. Rumack Harvey S. Singer

There are many potential adverse influences that may impact upon cognitive and behavioral problems of children who have epilepsy. These include inherited tendencies, the underlying epilepsy, associated brain pathology, and psychosocial factors. The role of anticonvulsant therapy in producing adverse neuropsychologic effects has, until recently, been largely ignored. Despite methodologic problem...

2014
Jochen Wulf Walter Brenner

Mutual effects between fixed and mobile broadband technologies remain up to this date largely unexplored. The few studies on this subject produce partially contradictory results. Diffusion oriented analysis approaches focused on cross-product effects on growth. Mutual effects on the market potential level have not been studied. In this article we develop and apply two diffusion models, which co...

2009

In many cases two interacting agents are concurrently administered, but are taken to minimize interactions or side effects. Precautions, such as dosage adjustments, must be taken in this event. Drug interactions are not always adverse, and they are sometimes taken advantage of therapeutically. For example, probenecid can be administered with penicillin to decrease the excretion rate of the peni...

2001

(Note by Dr. Andrew Saul: Fluoridation of water owes its continued existence more to politics than to science. If safety and effectiveness are truly considered, fluoride would be questionable even as a prescription drug. But to freely add it to public water supplies, often without any public vote whatsoever, is far beyond questionable. Mr. Meiers' discussion of the dangers of fluoride is import...

2005
JingJing Wang Joanna J. Bryson

Most primate societies are characterised by hierarchical dominance structures. Males are usually dominant over females, but in periods of sexual attraction (during females period of tumescence) male ‘tolerance’ towards females rises. (Hemelrijk, 2002) shows in a model that this ‘tolerance’ is created as a side effect due to the rise of female dominance during periods of sexual attraction. This ...

2010

162 Journal of Family Planning and Reproductive Health Care 2003: 29(3) Background Inevitably there are limited long-term safety data for any new contraceptive method. Detailed scientific studies, performed in a small number of women, provide evidence on mode of action. Larger clinical trials examine efficacy, side effects and acceptability. The number of women-years of exposure is less than fo...

Journal: :Management Science 2009
Raul O. Chao Stylianos Kavadias Cheryl Gaimon

T first step in transforming strategy from a hopeful statement about the future into an operational reality is to allocate resources to innovation and new product development (NPD) programs in a portfolio. Resource allocation and NPD portfolio decisions often span multiple levels of the organization’s hierarchy, leading to questions about how much authority to bestow on managers and how to stru...

Journal: :Computer Communications 2015
Gildas Avoine Sjouke Mauw Rolando Trujillo-Rasua

Distance bounding protocols are security countermeasures designed to thwart relay attacks. Such attacks consist in relaying messages exchanged between two parties, making them believe they communicate directly with each other. Although distance bounding protocols have existed since the early nineties, this research topic resurrected with the deployment of contactless systems, against which rela...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید