• No results found

Relapse for Time one (T1) and Time two (T2) (for

Original Article Time to relapse predicts post-relapse survival in recurrent osteosarcoma: a meta-analysis

Original Article Time to relapse predicts post-relapse survival in recurrent osteosarcoma: a meta-analysis

... early relapse predicted a worse PRS in recurrent osteosarco- ...culating time to relapse either from the initial diagnosisor the ...that time to relapse might be used to recognize ...

9

Clinicopathological features of acute promyelocytic leukemia : an experience in one institute emphasizing the morphological and immunophenotypic changes at the time of relapse.

Clinicopathological features of acute promyelocytic leukemia : an experience in one institute emphasizing the morphological and immunophenotypic changes at the time of relapse.

... has two morphological variants, namely macrogranular (M3) and mi- crogranular ...characteristics. Relapse occurs in approximately 20% of patients with ...at relapse is usually identical with the pri- ...

8

Improvement of a security enhanced one-time two-factor authentication and key agreement scheme

Improvement of a security enhanced one-time two-factor authentication and key agreement scheme

... Two-factor. Abstract In 2010, Hölbl et al. showed that Shieh et al.’s mutual authentication and key agreement scheme is vulnerable to the smart card lost attack, not achieving perfect forward secrecy, and proposed ...

5

Original Article Clinicopathological features of acute promyelocytic leukemia: an experience in one institute emphasizing the morphological and immunophenotypic changes at the time of relapse

Original Article Clinicopathological features of acute promyelocytic leukemia: an experience in one institute emphasizing the morphological and immunophenotypic changes at the time of relapse

... has two morphological variants, namely macrogranular (M3) and mi- crogranular ...characteristics. Relapse occurs in approximately 20% of patients with ...at relapse is usually identical with the pri- ...

7

Two-Restricted One Context Unification is in Polynomial Time

Two-Restricted One Context Unification is in Polynomial Time

... the one context unification problem of two equations F (r 1 ) = s 1 , F (r 2 ) = s 2 can be solved in polynomial time, including a polynomial size representation of all ...polynomial time ...

18

Teaching Time: One-to-two 50-minute periods

Teaching Time: One-to-two 50-minute periods

... geologic time scales (ice ...just one possible change. This is called a feedback effect—when one small change gives rise to other changes in a ...

9

Two birds with one stone - Improving patient wait time and satisfaction at the same time

Two birds with one stone - Improving patient wait time and satisfaction at the same time

... waiting time. • Our goal at was to reduce the time between a patient’s scheduled appointment and placement in an exam room to 10 minutes or less for a minimum of 90% of ...

29

SMS One-Time Passwords, Security in Two-Factor Authentication

SMS One-Time Passwords, Security in Two-Factor Authentication

... a one-time code when you logged on to a service online? Do you know why? The SMS is sent to help the service authenticate you, it’s a second layer of security for both you and the ...a ...

77

one donation at a time.

one donation at a time.

... If the Partnership for Giving vendor, The JK Group, has repeatedly tried to contact you regarding the selection of a new eligible organization and has received no response from you by [r] ...

9

One leg at a time

One leg at a time

... on one another? Would that be a good lesson? Must everything be a lesson? Lesson one: how to properly mix wine and soda ...Lesson two: how to stay on your side of the ...

58

Comparative Study of One Dimensional and Two Dimensional Dynamic Time Warping

Comparative Study of One Dimensional and Two Dimensional Dynamic Time Warping

... in two ways. One-dimensional raw speech data of command words are considered as input the ...method, two-dimensional features of the same set of data were ...these two methods were compared in ...

7

Two Factor Authentication Using Smartphone Generated One Time Password

Two Factor Authentication Using Smartphone Generated One Time Password

... Security is a major concern today in all sectors such as banks, governmental applications, military organization, educational institutions, etc. Government organizations are setting standards, passing laws and forcing ...

6

Time Valid One-Time Signature for Time-Critical Multicast Data Authentication

Time Valid One-Time Signature for Time-Critical Multicast Data Authentication

... adopt one-way hash chains to link these keys together, thereby avoiding the need for key ...are two merits of combining TV-OTS and hash chains to construct the multicast authentication scheme: 1) any later ...

9

SURVEY ON ONE TIME PASSWORD

SURVEY ON ONE TIME PASSWORD

... [2] ONE TIME PASSWORD (OTP) Since 1981 when Lamport introduced one time password schemes, many banks authentication systems are now using his theory to provide secure ...authentication. ...

7

This is a one-time complimentary download.

This is a one-time complimentary download.

... 2 These figures do not include a small number of cases that could not be classified, such as reopened and transferred cases, as well as hardship discharges. 3 The main variations are as follows: A debtor who received a ...

6

Caring, one person at a time.

Caring, one person at a time.

... Shareholder returns have outperformed many competitive benchmarks over 3 and 10-year periods, and we have had 50 consecutive years of dividend increases and 28 consecutive years of adjusted earnings increases. We’re ...

5

Is One-time Pad History?

Is One-time Pad History?

... modern one-time encryption applications, not the pencil-and-paper spy trade craft (although it is just as ...small one-time passwords or one-time keys, which are only valid for a ...

6

Short  One-Time  Signatures

Short One-Time Signatures

... the one-way function in an OTS scheme is being used as a commitment ...the one-way function with Pedersen commitments (of the form g s h r ) [38], we can use the algebraic properties of this commitment ...

17

Measles One More Time

Measles One More Time

... In any case, a two-dose schedule with the second dose given at school entry would not impact on the cost of control of school outbreaks for about a decade if the current pattern prevails[r] ...

7

One Time Password Server

One Time Password Server

... Edge One Time Password Server - Client API Microsoft ...includes two-factor authentication, role based delegated user administration, synchronization and ...

13

Show all 10000 documents...

Related subjects