Entity

Time filter

Source Type

New York, NY, United States

Lawand C.,Identify
Healthcare quarterly (Toronto, Ont.) | Year: 2014

Wounds are a serious healthcare issue with profound personal, clinical and economic implications. Using a working definition of compromised wounds, this study examines the prevalence of wounds by type and by healthcare setting using data from hospitals, home care, hospital-based continuing care and long-term care facilities within fiscal year 2011-2012 in Canada. It also evaluates several risk factors associated with wounds, such as diabetes, circulatory disease and age. Compromised wounds were reported in almost 4% of in-patient acute hospitalizations and in more than 7% of home care clients, almost 10% of long-term care clients and almost 30% of hospital-based continuing care clients. Patients with diabetes were much more likely to have a compromised wound than were patients without the disease. Copyright © 2014 Longwoods Publishing. Source


Patent
Identify | Date: 2012-09-28

According to one general aspect, a method may include monitoring the execution or at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.


According to an example implementation, a computer-readable storage medium, computer-implemented method and a system are provided to receive a first class, the first class indirectly implementing a first interface, wherein the first class extends a second class that directly implements the first interface, identify one or more directly implemented methods within the first class, determine a method signature for one or more of the directly implemented methods, estimate that the first class indirectly implements the first interface based on the method signatures for the one or more directly implemented methods, and instrument the first class based on the estimating that the first class indirectly implements the first interface.


Trademark
Identify | Date: 2016-02-02

Computer application software for mobile phones, namely, software for facilitating interactions between users with similar interests.


According to an example implementation, a computer-readable storage medium, computer-implemented method and a system are provided to receive a first class, the first class indirectly implementing a first interface, wherein the first class extends a second class that directly implements the first interface, identify one or more directly implemented methods within the first class, determine a method signature for one or more of the directly implemented methods, estimate that the first class indirectly implements the first interface based on the method signatures for the one or more directly implemented methods, and instrument the first class based on the estimating that the first class indirectly implements the first interface.

Discover hidden collaborations