Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Rebecca J. Stone"'
Autor:
Kristie L. Foley, Emily V. Dressler, Kathryn E. Weaver, Erin L. Sutfin, David P. Miller, Christina Bellinger, Carol Kittel, Rebecca J. Stone, W. Jeffrey Petty, Stephanie R. Land, John Spangler, Glenn J. Lesser, Caroline Chiles
Publikováno v:
Chest.
Autor:
Erin L. Sutfin, Rebecca J. Stone, Glenn J. Lesser, John G. Spangler, Emily V. Dressler, Christina Bellinger, David P. Miller, Caroline Chiles, Whitney D. Davis, Kristie L. Foley, Kathryn E. Weaver, Donna Lawler, W. Jeffrey Petty
Publikováno v:
Contemp Clin Trials
Introduction When the Centers for Medicare and Medicaid Services announced coverage for low dose CT lung cancer screening, they also mandated that imaging centers offer smoking cessation services. We designed the Optimizing Lung Screening (OaSiS) tri
Autor:
David D. Rahn, Rebecca J. Stone, Vincent A. Graziano, Donald D. McIntire, Robert D. Sims, Clifford Y. Wai, Joseph L. Sailors, Sujatha D. Pathi
Publikováno v:
International Urogynecology Journal. 24:319-323
Our purpose was to assess the accuracy of history and physical, cystourethroscopy, and magnetic resonance imaging (MRI) in preoperative diagnosis of urethral diverticula. This was a retrospective review of all patients who underwent surgical excision
Publikováno v:
American journal of obstetrics and gynecology. 199(6)
Objective The objective of the study was to assess whether cardinal-uterosacral ligament lateral vaginal cuff angle stitches at the time of total hysterectomy may assist in preventing subsequent apical vault prolapse. Study Design Total hysterectomie
Publikováno v:
BMC Bioinformatics, Vol 21, Iss 1, Pp 1-11 (2020)
Abstract Background Network motifs are connectivity structures that occur with significantly higher frequency than chance, and are thought to play important roles in complex biological networks, for example in gene regulation, interactomes, and metab
Externí odkaz:
https://doaj.org/article/bbd6a5aea6f445c2bbf9d9cca63e0b8c
Publikováno v:
IEEE Access, Vol 7, Pp 77387-77397 (2019)
We have entered an era where copious amounts of sensitive data are being stored in the cloud. To meet the rising privacy, reliability, and verifiability needs, we propose Gecko, a multi-cloud dispersal scheme where: (a) the key used to encrypt the da
Externí odkaz:
https://doaj.org/article/d44a4a4b76b445bda3346c79a05e40bb
Publikováno v:
IEEE Access, Vol 6, Pp 76627-76639 (2018)
Prediction accuracy (true positives, false positives, and so on) is the usual way for evaluating disk-failure prediction models. Realistically however, we aim not only to correctly predict failures, but also to protect data against failure, i.e., we
Externí odkaz:
https://doaj.org/article/aa160c0d46074309956e1482db0e897b