Surgical innovation and pioneering are important for improving patient outcome, but can be associated with learning curves. Although learning curves in surgery are a recognized problem, the impact of surgical learning...Surgical innovation and pioneering are important for improving patient outcome, but can be associated with learning curves. Although learning curves in surgery are a recognized problem, the impact of surgical learning curves is increasing, due to increasing complexity of innovative surgical procedures, the rapid rate at which new interventions are implemented and a decrease in relative effectiveness of new interventions compared to old interventions. For minimally invasive esophagectomy(MIE), there is now robust evidence that implementation can lead to significant learning associated morbidity(morbidity during a learning curve, that could have been avoided if patients were operated by surgeons that have completed the learning curve). This article provides an overview of the evidence of the impact of learning curves after implementation of MIE. In addition, caveats for implementation and available evidence regarding factors that are important for safe implementation and safe pioneering of MIE are discussed.展开更多
Named Data Networking(NDN)improves the data delivery efficiency by caching contents in routers. To prevent corrupted and faked contents be spread in the network,NDN routers should verify the digital signature of each ...Named Data Networking(NDN)improves the data delivery efficiency by caching contents in routers. To prevent corrupted and faked contents be spread in the network,NDN routers should verify the digital signature of each published content. Since the verification scheme in NDN applies the asymmetric encryption algorithm to sign contents,the content verification overhead is too high to satisfy wire-speed packet forwarding. In this paper, we propose two schemes to improve the verification performance of NDN routers to prevent content poisoning. The first content verification scheme, called "user-assisted",leads to the best performance, but can be bypassed if the clients and the content producer collude. A second scheme, named ``RouterCooperation ‘', prevents the aforementioned collusion attack by making edge routers verify the contents independently without the assistance of users and the core routers no longer verify the contents. The Router-Cooperation verification scheme reduces the computing complexity of cryptographic operation by replacing the asymmetric encryption algorithm with symmetric encryption algorithm.The simulation results demonstrate that this Router-Cooperation scheme can speed up18.85 times of the original content verification scheme with merely extra 80 Bytes transmission overhead.展开更多
The authors study the finite decomposition complexity of metric spaces of H, equipped with different metrics, where H is a subgroup of the linear group GL∞(E). It is proved that there is an injective Lipschitz map...The authors study the finite decomposition complexity of metric spaces of H, equipped with different metrics, where H is a subgroup of the linear group GL∞(E). It is proved that there is an injective Lipschitz map φ: (F, ds) --* (H,d), where F is the Thompson's group, ds the word-metric of F with respect to the finite generating set S and d a metric of H. But it is not a proper map. Meanwhile, it is proved that φ(F, ds) → (H, dl) is not a Lipschitz map, where dl is another metric of H.展开更多
Projection temporal logic(PTL) is an extension of interval temporal logic(ITL) with a new projection operator prj and infinite intervals which has been well investigated in the past ten years.In this paper,we review t...Projection temporal logic(PTL) is an extension of interval temporal logic(ITL) with a new projection operator prj and infinite intervals which has been well investigated in the past ten years.In this paper,we review the work on PTL in four aspects:(1) decidability,complexity and expressiveness of propositional PTL(PPTL);(2) modeling,simulation and verification language(MSVL);(3) formal verification approaches with MSVL and PPTL;and(4) supporting toolkit MSV.展开更多
文摘Surgical innovation and pioneering are important for improving patient outcome, but can be associated with learning curves. Although learning curves in surgery are a recognized problem, the impact of surgical learning curves is increasing, due to increasing complexity of innovative surgical procedures, the rapid rate at which new interventions are implemented and a decrease in relative effectiveness of new interventions compared to old interventions. For minimally invasive esophagectomy(MIE), there is now robust evidence that implementation can lead to significant learning associated morbidity(morbidity during a learning curve, that could have been avoided if patients were operated by surgeons that have completed the learning curve). This article provides an overview of the evidence of the impact of learning curves after implementation of MIE. In addition, caveats for implementation and available evidence regarding factors that are important for safe implementation and safe pioneering of MIE are discussed.
基金financially supported by Shenzhen Key Fundamental Research Projects(Grant No.:JCYJ20170306091556329).
文摘Named Data Networking(NDN)improves the data delivery efficiency by caching contents in routers. To prevent corrupted and faked contents be spread in the network,NDN routers should verify the digital signature of each published content. Since the verification scheme in NDN applies the asymmetric encryption algorithm to sign contents,the content verification overhead is too high to satisfy wire-speed packet forwarding. In this paper, we propose two schemes to improve the verification performance of NDN routers to prevent content poisoning. The first content verification scheme, called "user-assisted",leads to the best performance, but can be bypassed if the clients and the content producer collude. A second scheme, named ``RouterCooperation ‘', prevents the aforementioned collusion attack by making edge routers verify the contents independently without the assistance of users and the core routers no longer verify the contents. The Router-Cooperation verification scheme reduces the computing complexity of cryptographic operation by replacing the asymmetric encryption algorithm with symmetric encryption algorithm.The simulation results demonstrate that this Router-Cooperation scheme can speed up18.85 times of the original content verification scheme with merely extra 80 Bytes transmission overhead.
基金supported by the National Natural Science Foundation of China (No. 10731020)the Shanghai Natural Science Foundation of China (No. 09ZR1402000)
文摘The authors study the finite decomposition complexity of metric spaces of H, equipped with different metrics, where H is a subgroup of the linear group GL∞(E). It is proved that there is an injective Lipschitz map φ: (F, ds) --* (H,d), where F is the Thompson's group, ds the word-metric of F with respect to the finite generating set S and d a metric of H. But it is not a proper map. Meanwhile, it is proved that φ(F, ds) → (H, dl) is not a Lipschitz map, where dl is another metric of H.
基金supported by the National Natural Science Foundation of China(Grant Nos.61133001,61272117,61202038,61322202,61420106004 and 91418201)
文摘Projection temporal logic(PTL) is an extension of interval temporal logic(ITL) with a new projection operator prj and infinite intervals which has been well investigated in the past ten years.In this paper,we review the work on PTL in four aspects:(1) decidability,complexity and expressiveness of propositional PTL(PPTL);(2) modeling,simulation and verification language(MSVL);(3) formal verification approaches with MSVL and PPTL;and(4) supporting toolkit MSV.