Derek Atkins

Learn More
0 Abstract High surgical bed occupancy levels often result in heightened staff stress, frequent surgical cancellations and long surgical wait times. This congestion is in part attributable to surgical scheduling practices which often focus on the efficient use of operating rooms but ignore resulting downstream bed utilization. This paper describes a(More)
  • Derek Atkins, Michael Graa, Arjen K Lenstra, P Aul, C Leyland
  • 1994
We describe the computation which resulted in the title of this paper. Furthermore, we g i v e an analysis of the data collected during this computation. From these data, we derive the important o b s e r v ation that in the nal stages, the progress of the double large prime variation of the quadratic sieve integer factoring algorithm can more eeectively be(More)
BACKGROUND A patient's journey through the health care system is influenced by clinical and system processes across the continuum of care. METHODS To inform optimized access to care and patient flow for individuals with traumatic spinal cord injury (tSCI), we developed a simulation model that can examine the full impact of therapeutic or systems(More)
This paper is based on observations that competing retailers have the option of either agreeing in advance to transship excess inventory to each other or seeing unsatisfied customers switch to the competitor for a substitute. A transshipment game and a substitution game between competing retailers is studied. After establishing the existence and uniqueness(More)
The long-term impact of spinal cord injury (SCI) on the health care system imposes a need for greater efficiency in the use of resources and the management of care. The Access to Care and Timing (ACT) project was developed to model the health care delivery system in Canada for patients with traumatic SCI. Techniques from Operations Research, such as(More)
Lemieux as a protocol suitable for use on platforms with constrained computational resources, such as FPGAs, ASICs, and wireless sensors. It is a group-theoretic cryptographic protocol that allows two users to construct a shared secret via a Diffie–Hellman-type scheme over an insecure channel. Building on the refuted 2012 permutation-based attack of(More)