Learn More
This paper presents work conducted towards the development of an effective software engineering-based methodology for integrity control in the process of spreadsheet development. Various approaches and concepts within the discipline of software engineering are investigated. The proposed methodology consists of a set of coherent stages incorporating relevant(More)
PURPOSE To assess which antiepileptic medications (AEDs) have the best evidence for long-term efficacy or effectiveness as initial monotherapy for patients with newly diagnosed or untreated epilepsy. METHODS A 10-member subcommission of the Commission on Therapeutic Strategies of The International League Against Epilepsy (ILAE), including adult and(More)
In a multicentre, double-blind, parallel-group, placebo-controlled trial, a three-times daily regimen of tiagabine was evaluated as add-on therapy in 154 adult patients with refractory partial seizures. A total of 77 patients were randomised to treatment in each arm. Tiagabine HCl was titrated from an initial dose of 12-30 mg/day over 4 weeks. During the(More)
Epilepsy starting in childhood frequently persists through adolescence and into adult life, and an onset in adolescence itself is common. The management of the teenager with epilepsy is important but often inadequate. In 1991, a specific clinic for teenagers with epilepsy was established in Liverpool to address the unique needs and concerns of this age(More)
Identification and assessment of introduced and other toxicants is crucial to any comprehensive study of contaminants within the marine environment. The relationship between DNA single-strand breaks and the exposure of marine organisms to environmental contaminants was examined at sites in San Diego Bay, CA. A comprehensive assessment of the extent and(More)
This paper provides an overview of the Privilege Management Infrastructure (PMI) introduced in the 2000 edition of X.509. It describes the entities in the infrastructure: Sources of Authority, Attribute Authorities and Privilege Holders, as well as the basic data structure-the attribute certificate-that is used to hold privileges. The contents of attribute(More)
This paper analyses the security threats that can arise against an Active Directory server when it is included in a Web application. The approach is based on the STRIDE classification methodology. The paper also provides outline descriptions of countermeasures that can be deployed to protect against the different threats and vulnerabilities identified here.(More)
The focus in assessing new antiepileptic drugs (AEDs) varies with the needs of the assessor. Patients and doctors seek evidence-based clinical information, regulatory agencies look for efficacy and safety, and the health-care industry demands data on the risk-benefit ratio attached to a product. The pharmaceutical companies attempt to satisfy the interests(More)