Showing 521 - 540 results of 1,298 for search 'Shorter University', query time: 0.05s Refine Results
  1. 521
  2. 522

    Comparison of Perioperative Outcomes of Total Laparoscopic and Robotically Assisted Hysterectomy for Benign Pathology during Introduction of a Robotic Program by Gokhan Sami Kilic, Gradie Moore, Ayman Elbatanony, Carmen Radecki, John Y. Phelps, Mostafa A. Borahay

    Published 2011-01-01
    “…Robotically assisted hysterectomy is feasible with low morbidity, a shorter hospital stay, and less blood loss. This suggests that robotic assistance facilitates a minimally invasive approach for patients with larger uterine size even during implementing a new robotic program.…”
    Get full text
    Article
  3. 523
  4. 524
  5. 525
  6. 526
  7. 527
  8. 528

    Addition of anal encirclement to perineal proctosigmoidectomy: a retrospective review by Aiya Amery, Kayla Marritt, Zarrukh Baig, Haven Roy, Dilip Gill, Nathan Ginther

    Published 2025-01-01
    “…Patients who underwent the combined procedure had a shorter length of stay by 2.3 days (p = 0.03). There was no difference in post-operative complications or operating time.ConclusionsRoutine anal encirclement in perineal proctosigmoidectomy reduces recurrence rates and length of stay without increasing operating time or complications.…”
    Get full text
    Article
  9. 529
  10. 530
  11. 531
  12. 532
  13. 533
  14. 534
  15. 535
  16. 536
  17. 537
  18. 538

    Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing by Jiawei ZHANG, Jianfeng MA, Zhuo MA, Teng LI

    Published 2021-10-01
    “…General ciphertext-policy attribute-based encryption (CP-ABE) provides fine-grained access control for data sharing in cloud computing, but its plaintext formed access policy may cause leakage of private and sensitive data.And revoking a malicious user by accurately tracing the identity according to a leaked decryption key is a huge challenge.Moreover, most of existing revocable schemes incur long user revocation list and low efficiency.To solve these problems, a time-based and privacy preserving revocable and traceable data sharing scheme was proposed based on CP-ABE to support expressive monotonic and partial hidden access policy, large attribute universe by conceal the attribute values in access policy.Time-limited data access control using hierarchical identity-based encryption was achieved to set key valid period for users.Moreover, with the approaches of white-box tracing and binary tree, efficient user tracing and direct revocation with shorter revocation list was realized together with high efficiency via online/offline and verifiable outsourced decryption techniques.Furthermore, the scheme was secure under decisional q-BDHE assumption.Theoretical analysis and extensive experiments demonstrate its advantageous performance in computational and storage cost.…”
    Get full text
    Article
  19. 539
  20. 540