2,992 research outputs found
Evidence-based de-implementation for contradicted, unproven, and aspiring healthcare practices
Abandoning ineffective medical practices and mitigating the risks of untested practices are important for improving patient health and containing healthcare costs. Historically, this process has relied on the evidence base, societal values, cultural tensions, and political sway, but not necessarily in that order. We propose a conceptual framework to guide and prioritize this process, shifting emphasis toward the principles of evidence-based medicine, acknowledging that evidence may still be misinterpreted or distorted by recalcitrant proponents of entrenched practices and other biases
Replication in Genome-Wide Association Studies
Replication helps ensure that a genotype-phenotype association observed in a
genome-wide association (GWA) study represents a credible association and is
not a chance finding or an artifact due to uncontrolled biases. We discuss
prerequisites for exact replication, issues of heterogeneity, advantages and
disadvantages of different methods of data synthesis across multiple studies,
frequentist vs. Bayesian inferences for replication, and challenges that arise
from multi-team collaborations. While consistent replication can greatly
improve the credibility of a genotype-phenotype association, it may not
eliminate spurious associations due to biases shared by many studies.
Conversely, lack of replication in well-powered follow-up studies usually
invalidates the initially proposed association, although occasionally it may
point to differences in linkage disequilibrium or effect modifiers across
studies.Comment: Published in at http://dx.doi.org/10.1214/09-STS290 the Statistical
Science (http://www.imstat.org/sts/) by the Institute of Mathematical
Statistics (http://www.imstat.org
Recommended from our members
Design and Implementation of Virtual Private Services
Large scale distributed applications such as electronic commerce and online marketplaces combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new security and privacy issues, which are exacerbated by the complexity of the operating environment. In order to handle policies at multiple locations, the usual tools available (firewalls and compartmented file storage) get to be used in ways that are clumsy and prone to failure. We propose a new approach, virtual private services. Our approach relies on two functional divisions. First, we split policy specification and policy enforcement, providing local autonomy within the constraints of the global security policy. Second, we create virtual security domains, each with its own security policy. Every domain has an associated set of privileges and permissions restricting it to the resources it needs to use and the services it must perform. Virtual private services ensure security and privacy policies are adhered to through coordinated policy enforcement points. We describe our architecture and a prototype implementation, and present a preliminary performance evaluation confirming that our overhead of policy enforcement using is small
US Food and Drug Administration Approvals of Drugs and Devices Based on Nonrandomized Clinical Trials: A Systematic Review and Meta-analysis
Recommended from our members
The Coherent File Distribution Protocol
CFDP is a protocol that takes advantage of the broadcast nature of CSMA networks to speed up simultaneous one-to-many file transfers (e.g., when booting diskless workstations). The CFDP server listens and services requests for entire files or portions thereof. CFDP clients first determine whether the file they are interested in is already being transferred, in which case they "eavesdrop" and load as much of it as they can, or they initiate a new transfer. The clients timeout when the server stops transmitting, and if they are still missing parts of the file they request them with a block-transfer request. CFDP is a back-end protocol a front end is needed to handle naming and security issues. A simple such front end is also presented here
Recommended from our members
Implementing Pushback: Router-Based Defense Against DDoS Attacks
Pushback is a mechanism for defending against distributed denial-of-service (DDoS) attacks. DDoS attacks are treated as a congestion-control problem, but because most such congestion is caused by malicious hosts not obeying traditional end-to-end congestion control, the problem must be handled by the routers. Functionality is added to each router to detect and preferentially drop packets that probably belong to an attack. Upstream routers are also notified to drop such packets (hence the term Pushback) in order that the router's resources be used to route legitimate traffic. In this paper we present an architecture for Pushback, its implementation under FreeBSD, and suggestions for how such a system can be implemented in core routers
- …
