Publications by authors named "Gregory Levitin"

Background: Port-wine stains (PWS) are congenital low-flow vascular malformations of the skin. PWS tend to become thicker and darker with time. Laser therapy is the gold standard and the first-line therapy for treating PWS.

View Article and Find Full Text PDF

The effect of multiple general anesthesia (mGA) procedures administered in early life is a critical theme and has led the Food and Drug Administration (FDA) to issue an alert. This systematic review seeks to explore the potential effects on neurodevelopment of mGA on patients under 4 years. The Medline, Embase and Web of Science databases were searched for publications up to 31 March 2021.

View Article and Find Full Text PDF

For some critical applications, successfully accomplishing the mission or surviving the system through aborting the mission and performing a rescue procedure in the event of certain deterioration condition being satisfied are both pivotal. This has motivated considerable studies on mission abort policies (MAPs) to mitigate the risk of system loss in the past several years, especially for standby systems that use one or multiple standby sparing components to continue the mission when the online component fails, improving the mission success probability. The existing MAPs are mainly based on the number of failed online components ignoring the status of the standby components.

View Article and Find Full Text PDF

Many real-world systems use mission aborts to enhance their survivability. Specifically, a mission can be aborted when a certain malfunction condition is met and a risk of a system loss in the case of a mission continuation becomes too high. Usually, the rescue or recovery procedure is initiated upon the mission abort.

View Article and Find Full Text PDF

Purpose: GNAQ mutations have been identified in port wine stains (both syndromic and nonsyndromic) and melanocytic ocular neoplasms. This study investigates the presence of GNAQ mutations in diffuse (those associated with Sturge-Weber syndrome [SWS]) and solitary choroidal hemangiomas.

Participants: Tissue from 11 patients with the following diagnoses: port wine stain (n = 3), diffuse choroidal hemangioma (n = 1), solitary choroidal hemangioma (n = 6), and choroidal nevus (n = 1).

View Article and Find Full Text PDF

Empowered by virtualization technology, service requests from cloud users can be honored through creating and running virtual machines. Virtual machines established for different users may be allocated to the same physical server, making the cloud vulnerable to co-residence attacks where a malicious attacker can steal a user's data through co-residing their virtual machines on the same server. For protecting data against the theft, the data partition technique is applied to divide the user's data into multiple blocks with each being handled by a separate virtual machine.

View Article and Find Full Text PDF

Many real-world critical systems, e.g., aircrafts, manned space flight systems, and submarines, utilize mission aborts to enhance their survivability.

View Article and Find Full Text PDF

This article extends the previous research of consecutive attacks strategy by assuming that an attacker observes the outcome of each attack imperfectly. With given probabilities it may wrongly identify a destroyed target as undestroyed, and wrongly identify an undestroyed target as destroyed. The outcome of each attack is determined by a contest success function that depends on the amount of resources allocated by the defender and the attacker to each attack.

View Article and Find Full Text PDF

The article considers the optimal resource distribution in a parallel system between increasing protection and providing redundancy in a situation when the attacker's and defender's resources are stockpiling and the resource increment rate is constant. It is assumed that the system must perform within an exogenously given time horizon and the attack time probability is uniformly distributed along this horizon. The defender optimizes the resource distribution in order to minimize the system destruction probability during the time horizon.

View Article and Find Full Text PDF

A target is protected by the defender and attacked by an attacker launching sequential attacks. For each attack, a contest intensity measures whether the agents' efforts have low or high impact on the target vulnerability (low vs. high contest intensity).

View Article and Find Full Text PDF

Objective: To report our experience in and our surgical technique of treating vascular anomalies of the buccofacial region using an intraoral buccomucosal flap approach.

Design: Retrospective medical record review and illustration of a specific surgical procedure.

Setting: Academic tertiary care center.

View Article and Find Full Text PDF

The article considers strategic defense and attack of a system that can be separated into parallel elements. The defender distributes its resource between separation and protecting the elements from outside attacks. The vulnerability of each element is determined by an attacker-defender contest success function, which depends on a contest intensity that may increase or decrease through the separation process.

View Article and Find Full Text PDF