131 results on '"Milan P"'
Search Results
2. Field Stimulation
- Author
-
Nelson, Ehren R., primary, Vaclavik, Andrew, additional, and Stojanovic, Milan P., additional
- Published
- 2016
- Full Text
- View/download PDF
3. Information Technologies: Alternative Delivery Systems for Rural Schools. Report Update.
- Author
-
Wall & Associates, Lincoln, NE. and Wall, Milan
- Abstract
Technological delivery systems currently available or in use are examined for adaptability by rural schools, especially high schools faced with increasing demands to expand curriculum. This report focuses on the Mid-Continent Regional Educational Laboratory's (McREL's) service area of Colorado, Kansas, Missouri, Nebraska, North Dakota, South Dakota, and Wyoming, but the information would be useful to policymakers concerned with rural schools in other regions. Descriptions, expenses, and advantages are given for audio teleconferencing, videotape lessons, interactive television, interactive video, and computer networks. Profiles are provided for 20 projects employing modern informational or telecommunications technologies to expand instructional access or quality. Project description, implications for rural schools, costs, comments about enrollments, evaluations, alterations, and name/address of contact person are provided for each project. A chart lists information about technology-oriented delivery systems already available in McREL's seven-state area. The report emphasizes delivery systems which schools could employ immediately without tremendous expense and those which combine technologies with face-to-face supervision. Practical advice for choosing technologies emphasizes practicality, resource sharing, overcoming political barriers to change, and adapting principles of successful entrepreneurship when implementing new technologies. (LFL)
- Published
- 1985
4. Children, Spaces, Relations: Metaproject for an Environment for Young Children.
- Author
-
Reggio Children, Reggio Emilia (Italy)., Domus Academy Research Center, Milan (Italy)., Ceppi, Giulio, Zini, Michele, Ceppi, Giulio, Zini, Michele, Reggio Children, Reggio Emilia (Italy)., and Domus Academy Research Center, Milan (Italy).
- Abstract
This book describes a project on designing spaces for young children; the aim of the project is to enable a "meeting of minds" between the pedagogical philosophy of Reggio Emilia preschools and the innovative experiences within the culture of design and architecture. The book presents the project in three main sections: (1) a critical analysis of the cumulative experience of the municipal early childhood system of Reggio Emilia, with the aim of formulating general criteria of quality and presenting possible scenarios, using keywords and metaphors, in an attempt to identify the desirable characteristics of a space for young children; (2) reflections on the tools of design, with indications regarding both the distribution of space and the "soft qualities" (light, color, materials, smell, sound, microclimate), to provide tools of analysis and practical indications for both the interior and exterior design of infant-toddler centers and schools for young children; and (3) essays discussing the pedagogical and architecture/design issues that form the theoretical basis of the project, a product of studies carried out in the municipal preschools of Reggio Emilia and at Domus Academy as part of the joint research project. (EV)
- Published
- 1998
5. Injection Procedures
- Author
-
Slezak, Jan, primary and Stojanovic, Milan P., additional
- Published
- 2008
- Full Text
- View/download PDF
6. Therapeutic Injections for the Treatment of Axial Neck Pain and Cervicogenic Headaches
- Author
-
Cohen, Steven P., primary and Stojanovic, Milan P., additional
- Published
- 2008
- Full Text
- View/download PDF
7. List of Contributors
- Author
-
Abbasi, Arjang, primary, Abdel-Moty, Elsayed, additional, Abdi, Salahadin, additional, Adin, David R., additional, Ahn, Sang-Ho, additional, Akuthota, Venu, additional, Ante, William A., additional, Antony, Alvin K., additional, Aprill, Charles N., additional, Are, Madhuri, additional, Auerbach, Joshua D., additional, Barolat, Giancarlo, additional, Bartholomeeusen, Katrien, additional, Bartoli, Lisa M., additional, Bermas, Bonnie Lee, additional, Bhagia, Sarjoo M., additional, Bhargava, Amit S., additional, Bhat, Atul L., additional, Birnbaum, Klaus, additional, Bogduk, Nikolai, additional, Bonaiuti, Donatella, additional, Bonaldi, Guiseppe, additional, Borg-Stein, Joanne, additional, Botwin, Kenneth P., additional, Brigham, Craig D., additional, Bronov, Oleg, additional, Brown, Lee Ann, additional, Brown, Mark D., additional, Bryce, Thomas N., additional, Burtony, Allen W., additional, Carrino, John A., additional, Chen, Bojun, additional, Chen, Yung Chuan, additional, Chin, Cynthia, additional, Chin, Kingsley R., additional, Chou, Larry H., additional, Chow, David W., additional, Cinotti, Gianluca, additional, Cohen, Steven P., additional, Cooke, Paul, additional, Cucuzzella, Anthony R., additional, Daniels, Richard J., additional, David, Kenny S., additional, Day, Gregory, additional, Day, Miles, additional, Delamarter, Rick B., additional, DePalma, Michael J., additional, Derby, Richard, additional, Dillingham, Timothy R., additional, Dolinskas, Carol A., additional, Drezner, Jonathan A., additional, Edrich, Thomas, additional, El-Abd, Omar, additional, Ellen, Mark I., additional, Elliott, Dawn M., additional, Everett, Clifford R., additional, Fayyazi, Amir H., additional, Feler, Claudio A., additional, Fernandez, Julius, additional, Ferrari, Robert, additional, Fischgrund, Jeffrey S., additional, Fishbain, David A., additional, Fitzgerald, Colleen M., additional, Floman, Yizhar, additional, Fox, Edward J., additional, Furman, Michael B., additional, Gallagher, Rollin M., additional, Garfin, Steven R., additional, Garvey, Timothy A., additional, Gatchel, Robert J., additional, Gerner, Peter, additional, Gerszten, Peter C., additional, Gilchrist, Russell V., additional, Gotlin, Robert S., additional, Grady, M. Sean, additional, Guyer, Richard D., additional, Haig, Andrew J., additional, Hanks, Stephen, additional, Hannibal, Matthew, additional, Harb, Mouchir, additional, Harney, Donal F., additional, Harrast, Mark A., additional, Hasan, Syed Anees, additional, Haspeslagh, Sara Ruth Sanne, additional, Heavner, James, additional, Hellinger, Johannes, additional, Hellinger, Stefan, additional, Helper, Steven, additional, Herkowitz, Harry N., additional, Hosalkar, Harish S., additional, Hsu, Kenneth, additional, Hubbard, Raymond D., additional, Huston, Christopher W., additional, Isaac, Victor W., additional, Isaac, Zacharia, additional, Kang, James D., additional, Kantha, Brinda S., additional, Kaplan, Frederick S., additional, Karppinen, Jaro, additional, Kawaguchi, Yoshiharu, additional, Hynes, Christina Kerger, additional, Kim, Byung-Jo, additional, Kim, Choll W., additional, Kim, Daniel H., additional, Kim, David H., additional, Knaub, Mark A., additional, Krabak, Brian J., additional, Krames, Elliot S., additional, Kristiansson, Per O.J., additional, Kouri, Jukka-Pekka, additional, Lackman, Richard D., additional, Lagattuta, Francis P., additional, Lane, Joseph M., additional, Le, Hoang N., additional, Lee, Kathryn E., additional, Lee, Sang-Heon, additional, Lenrow, David A., additional, Lento, Paul H., additional, Lieberman, Isador H., additional, Lin, Julie T., additional, Lipetz, Jason S., additional, Liss, Donald, additional, Liss, Howard, additional, Lobel, Steven M., additional, López-Acevedo, Carmen E, additional, Lord, Susan M., additional, Lu, William W., additional, Luk, Keith D.K., additional, Lutz, Gregory E., additional, Maigne, Jean-Yves, additional, Malanga, Gerard A., additional, Marley, Julie, additional, Materson, Richard, additional, Mattern, Christopher J., additional, Mayer, Eric A.K., additional, Mayer, Tom G., additional, McCabe, Frank, additional, McLaughlin, Colleen, additional, McPhee, Ian Bruce, additional, Mehta, Samir, additional, Melfi, Renée S., additional, Metkus, Thomas, additional, Michaels, Mathew, additional, Micheo, William F., additional, Minkoff, Evan R., additional, Moley, Peter J., additional, Monticone, Marco, additional, Moonis, Gul, additional, Moore, Michael Ray, additional, Moskowitz, Michael H., additional, Mostoufi, S. Ali, additional, Nadler, Scott F., additional, Negrini, Stefano, additional, Niederwanger, Markus, additional, O'Neill, Conor W., additional, Ohnmeiss, Donna D., additional, Ostelo, Raymond W.J.G., additional, Ostrowski, Jeffrey, additional, Park, Ashley Lewis, additional, Parmar, Vikram, additional, Patel, Rajeev K., additional, Perry, Andrew, additional, Phillips, Frank M., additional, Pignolo, Robert J., additional, Plastaras, Christopher T., additional, Postacchini, Franco, additional, Postacchini, Roberto, additional, Pradhan, Ben B., additional, Prager, Joshua P., additional, Prather, Heidi, additional, Prawak, Adriana S., additional, Press, Joel M., additional, Qiu, G.X., additional, Racz, Gabor B., additional, Ragnarsson, Kristjan T., additional, Rao, Raj D., additional, Reeves, Ryan S., additional, Rigolosi, Luke, additional, Rosomoff, Hubert L., additional, Rosomoff, Renee Steele, additional, Rothman, Sarah M., additional, Russell, Anthony S., additional, Rydevik, Bjorn, additional, Sakalkale, Durgadas, additional, Savarese, Robert, additional, Sawchuk, Terry C., additional, Schofferman, Jerome, additional, Schuster, James, additional, Schwartz, Eric D., additional, Shah, Rinoo Vasant, additional, Sheth, Parag, additional, Simeone, Frederick A., additional, Simotas, Alexander C., additional, Singh, Gurkirpal, additional, Singh, Ramnik, additional, Skaggs, Clayton D, additional, Slezak, Jan, additional, Slipman, Curtis W., additional, Smeal, Wesley L., additional, Solomon, Jennifer L., additional, Sommer, Hillel M., additional, Sorosky, Brad, additional, Southern, Daniel, additional, Sowa, Gwendolyn A., additional, Stojanovic, Milan P., additional, Sullivan, William J., additional, Talu, Gul Koknel, additional, Tarquinio, Andrea, additional, Tasca, Philip, additional, Thomas, Santhosh A., additional, Thongtrangan, Issada, additional, Tirado, Carlos F., additional, Tobey, John E., additional, Togawa, Daisuke, additional, Torbert, Jesse T., additional, Trevisan, Carlo, additional, Triano, John J., additional, Tyburski, Mark D., additional, Uddin, Mohammad N., additional, Vaccaro, Alexander, additional, Vad, Vijay B., additional, Wiele, Christophe Van de, additional, van Kleef, Maarten, additional, Van Zundert, Jan, additional, Vlassakov, Kamen, additional, Weigele, John B., additional, Welch, William C., additional, Wen, C.Y., additional, Windsor, Robert E., additional, Winklestein, Beth A., additional, Won, Douglas S., additional, Wood, Kirkham, additional, Yerramalli, Chandra S, additional, Yeung, Anthony T., additional, Yeung, Christopher Alan, additional, Yin, Way, additional, Zaman, Faisel M., additional, and Zucherman, James F., additional
- Published
- 2008
- Full Text
- View/download PDF
8. Contributors
- Author
-
Adams, Gregg P., primary, Abbitt, Bruce, additional, Almond, Glen W., additional, Althouse, Gary C., additional, Amass, Sandra F., additional, Anderson, Mark L., additional, Asher, Geoffrey William, additional, Ayres, Sandra L., additional, Bahnson, Peter B., additional, Bartlewski, Pawel M., additional, Barth, Albert D., additional, Basrur, Parvathi K., additional, Bazer, Fuller, additional, Bello, Nora M., additional, Blackford, Jim, additional, Blake, John E., additional, BonDurant, Robert H., additional, Braun, William, additional, Bravo, P. Walter, additional, Bringans, Mike J., additional, Buckrell, Brian C., additional, Bulgin, Marie, additional, Card, Claire, additional, Carleton, Carla L., additional, Casteel, Stan W., additional, Caudle, A.B., additional, Chenoweth, Peter J., additional, Chenier, Tracey, additional, Christmas, Rodney A., additional, Cleaver, Brian D., additional, Collins, James E., additional, Colloton, Jill, additional, Cowart, Ross P., additional, Constantinescu, Gheorghe M., additional, Cox, Nancy M., additional, Cunningham, Wayne, additional, Dawes, Maisie Ernestine, additional, Dawson, Lionel J., additional, Dennis, Stanley M., additional, Dial, Gary D., additional, Domínguez, Miguel, additional, Drost, Maarten, additional, East, Nancy E., additional, Divinia Edens, Mylissa Shonda, additional, Eicker, Steven, additional, Eiler, Hugo, additional, Engelken, Terry J., additional, English, Anthony W., additional, Estill, Charles T., additional, Evans, Timothy J., additional, Fangman, Thomas J., additional, Farin, Peter W., additional, Fecteau, Kellie A., additional, Fetrow, John, additional, Fitzgerald, Jim, additional, Flores-Foxworth, Gabriela, additional, Floyd, James G., additional, Forbes, Lorry B., additional, Ganjam, Venkataseshu K., additional, Garcia, Antonia, additional, Garverick, H. Allen, additional, Goodrowe, Karen L., additional, Goyal, Hari O., additional, Grinde, John, additional, Haigh, Jerry C., additional, Hansen, Peter James, additional, Hardin, David K., additional, Heath, A.M., additional, Held, Jean-Pierre, additional, Hinrichs, Katrin, additional, Holler, Larry D., additional, Hopkins, Fred M., additional, Hopper, Richard M., additional, Huanca, Wilfredo, additional, Hunton, J.R., additional, Immegart, Heidi, additional, Jacobson, Harry A., additional, Kasimanickam, Ramanathan, additional, Kastelic, John P., additional, Keisler, Duane H., additional, Kelling, Clayton L., additional, Kennedy, Peter C., additional, Kimberling, Cleon V., additional, Kochhar, Harpreet S., additional, Knox, Robert V., additional, Kuster, Christopher E., additional, Larson, Robert L., additional, LeBlanc, Michelle M., additional, Ley, William B., additional, Long, Patrick, additional, Lopate, Cheryl, additional, Love, Charles C., additional, Lucy, Matthew C., additional, Marsh, Deborah, additional, Marsh, Will E., additional, Mastromonaco, Gabriela F., additional, Matsas, David, additional, McDonnell, Sue M., additional, Memon, Mushtaq A., additional, Menzies, Paula I., additional, Meyers, Patrick J., additional, Mickelson, W. Duane, additional, Mobini, Seyedmehdi, additional, Moore, Karen, additional, Morgan, Gregor, additional, Morrison, Robert B., additional, Mulley, Robert C., additional, Mylne, M.J.A., additional, Nebel, Raymond L., additional, Nie, Gary, additional, Norman, Scott, additional, Nuti, Lou, additional, O'Connor, Michael L., additional, Othen, Leanne S., additional, Parsons, Gerilyn A., additional, Patterson, David J., additional, Peek, Simon F., additional, Pinto, Carlos R.F., additional, Plante, Claire, additional, Pollard, John, additional, Polson, Dale D., additional, Porter, Michael B., additional, Pugh, David Gartrell, additional, Pursley, James Richard, additional, Rae, D. Owen, additional, Ragon, Amanda C., additional, Randle, Richard F., additional, Rapnicki, Paul, additional, Ratto, Marcelo H., additional, Rawlings, Norman C., additional, Risco, Carlos A., additional, Robinson, Gillian, additional, Rowe, Joan Dean, additional, Rowell, Janice E., additional, Safranski, Timothy J., additional, Samper, Juan C., additional, Schumacher, Jim, additional, Sertich, Patricia L., additional, Shannon, Marcia Carlson, additional, Sharp, Daniel C., additional, Shipka, Milan P., additional, Shipley, C.F.B., additional, Shore, M. Dawn, additional, Slusher, Steven H., additional, Smith, Mary C., additional, Smith, Michael F., additional, Spain, James N., additional, Stanton, Mary Beth, additional, Steenholdt, Christian W., additional, Stevenson, Jeffrey S., additional, Stewart, Steven, additional, Stott, Jeffrey L., additional, Sumar, Julio, additional, Swecker, William S., additional, Swerczek, T.W., additional, Thomas, Philip G.A., additional, Threlfall, Walter R., additional, Tibary, Ahmed, additional, Torremorell, Montserrat, additional, Trejo, Che, additional, Tubbs, Roderick C., additional, Tyler, Jeff W., additional, Van Camp, Steven D., additional, Vanderwall, Dirk K., additional, Van Saun, Robert J., additional, Varner, Dickson D., additional, Vaughan, Jane, additional, Voss, Kyle, additional, Walker, Richard L., additional, Wilson, Peter R., additional, Wilson, Warren D., additional, Wolfsdorf, Karen, additional, Woodbury, Murray R., additional, Woods, Gordon L., additional, Yaeger, Michael J., additional, Youngquist, Robert S., additional, and Zulovich, Joseph M., additional
- Published
- 2007
- Full Text
- View/download PDF
9. Reindeer Reproductive Management
- Author
-
BLAKE, JOHN E., primary, ROWELL, JANICE E., additional, and SHIPKA, MILAN P., additional
- Published
- 2007
- Full Text
- View/download PDF
10. Spinal Cord Stimulation
- Author
-
Stojanovic, Milan P., primary and Abdi, Salahadin, additional
- Published
- 2005
- Full Text
- View/download PDF
11. In Vitro Anti-Inflammatory and Antimicrobial Activities of Phenylpropanoids from Piper betle L. (Piperaceae)
- Author
-
Williams, L. A. D., primary, Vasquez, E. A., additional, Milan, P. P., additional, Zebitz, C., additional, and Kraus, W., additional
- Published
- 2002
- Full Text
- View/download PDF
12. UCLA International Conference: “Few Particle Problems in the Nuclear Interaction” August 1972
- Author
-
Afnan, Iraj R., primary, Allas, Richard G., additional, Amado, Ralph D., additional, Antolkovic, B., additional, Arman, Moosa, additional, Aslanides, Elie A., additional, Avishai, Yshai, additional, Bacher, R.F., additional, Ali, M., additional, Alt, Erwin O., additional, Amaldi, Ugo, additional, Anzelon, George A., additional, Arvieux, Jacques, additional, Aviles, Joseph B., additional, Axen, David A., additional, Baer, Helmut W., additional, Ballot, Jean-Louis, additional, Barnes, Peter D., additional, Baumann, Paule, additional, Beard, G., additional, Victor, Exec., additional, Belyaev, Vladimir B., additional, Beregi, Peter, additional, Berggren, Tore K.H., additional, Beurtey, R., additional, Bhasin, Vidya S., additional, Bonbright, Daniel I., additional, Barbini, Roberto, additional, Barrett, Bruce R., additional, Beam, John E., additional, Beer, George A., additional, Benn, Joachim E., additional, Blair, Ian M., additional, Bertsch, George, additional, Bhakar, Balram Singh, additional, Birchall, James, additional, Bondelid, R.O., additional, Bonner, Billy E., additional, Boyard, Jean-Louis, additional, Brady, Thomas J., additional, Breunlich, Wolfgang H., additional, Brown, Gerald, additional, Brown, Virginia R., additional, Cameron, John M., additional, Cernigoi, Cesare, additional, Chemarin, Michel, additional, Chemtob, Marc, additional, Bosco, Bernardino, additional, Brady, F.Paul, additional, Brayshaw, David D., additional, Brolley, John E., additional, Brown, Ronald E., additional, Brückmann, Hanno, additional, Carlson, Richard F., additional, Chang, Chia-Cheh, additional, Cheng, Vianney K., additional, Ciftan, Mikael, additional, Clement, David M., additional, Cole, Robert K., additional, Conzett, Homer E., additional, Costa, Sergio, additional, Cramer, John G., additional, Cujec, Bibiana, additional, Day, Benjamin D., additional, Delacroix, Etienne A., additional, De Swart, Johan J., additional, Ebenhoh, W., additional, Eisenberg, J., additional, Cohen, Harold L., additional, Comiso, Josefino C., additional, Cooper, Larry R., additional, Cowley, Anthony A., additional, Crowe, Kenneth M., additional, Davis, Jay C., additional, de Botton, Nico, additional, De La Ripelle, M.F., additional, Didelez, Jean-Pierre, additional, Edgington, John A., additional, Eisenstein, Robert A., additional, El Baz, Edgard, additional, Eramzhyan, Roudolf A., additional, Ferreira, Erasmo, additional, Fiedeldey, Harry H., additional, Frascaria, Robert, additional, Furic, M., additional, Gemmeke, Hartmut, additional, Gignoux, Claude, additional, Glodis, Paul F., additional, Goulard, Gisele, additional, Epstein, Martin B., additional, Fiarman, Sidney, additional, Forster, H.H., additional, Frois, Bernard A., additional, Gal, Avraham, additional, Gibson, Benjamin F., additional, Glavish, Hilton F., additional, Gorodetzky, Philippe, additional, Guaraldo, Carlo, additional, Greenless, George W., additional, Griss, Martin L., additional, Gruebler, Willi E., additional, Haase, Ernst L., additional, Hadjimichael, E., additional, Hall, James E., additional, Heiss, Peter, additional, Hennell, Michael A., additional, Hofstadter, Robert, additional, Hussein, Mahir S., additional, Gregoire, Ghislain, additional, Gross, Franz L., additional, Gugelot, P.C., additional, Haddock, Roy P., additional, Halbert, Melvyn L., additional, Harms, Edward A., additional, Henley, Ernest M., additional, Holmgren, Harry D., additional, Huffman, Arthur H., additional, Hu, Chi-Yu, additional, Ingram, C.H., additional, Jain, Mahavir, additional, Jarmie, Nelson, additional, Jones, Garth, additional, Karlsson, B.R., additional, Kilian, Kurt, additional, Kim, Yeong E., additional, King, Nicholas S.P., additional, Kok, Lambrecht P., additional, Kremer, Peter, additional, Jackson, Daphne F., additional, Jacquot, Claude, additional, Johansson, Arne, additional, Jonanovich, Jovan, additional, Kharchenko, V.F., additional, Kim, C.C., additional, Kisslinger, L., additional, Kluge, Wolfgang, additional, Komarov, V.V., additional, Laget, Jean-Marc, additional, Lambert, James M., additional, Langevin-Joliot, H., additional, Lehman, Elliot Stephen, additional, Levin, Frank S., additional, Liou, Ming-kung, additional, Lodhi, M.A.K., additional, Mack, Gunther, additional, Margaziotis, Demitrius J., additional, McCarthy, Ian E., additional, McKee, James S.C., additional, Mett, N.P., additional, Lang, Lang, additional, Langworthy, James B., additional, Leung, K.C., additional, Lim, T.K., additional, Locher, Milan P., additional, Lynen, Uli, additional, Makino, Motoji, additional, Pierre, Marmier, additional, McDonald, F. Alan, additional, McMillan, Malcolm, additional, Meyerhof, Walter E., additional, Michelotti, Leo P., additional, Miller, Charles A., additional, Moazed, Cyrus, additional, Morlet, Marcel, additional, Moszkowski, Steven A., additional, Nakamura, Hiroshi, additional, Nixon, Gary D., additional, Noyes, H. Pierre, additional, Oberhummer, Heinz, additional, Ohlsen, Gerald G., additional, Miljanic, Duro, additional, Mitra, A.N., additional, Moravcsik, Michael J., additional, Munch, Stephan X., additional, Nagatani, K., additional, Narboni, Philippe R., additional, Noble, Julian V., additional, Nunberg, Paolo, additional, O'Connell, James S., additional, Paic, G., additional, Petersen, Edward L., additional, Phillips, Gerald C., additional, Pieper, Steven C., additional, Piragino, Guido, additional, Primakoff, Henry, additional, Radvanyi, Pierre C., additional, Remler, Edward A., additional, Riska, Dan Olof, additional, Robertson, Lyle P., additional, Rogers, Joel G., additional, Rosen, Louis, additional, Phillips, Anthony C., additional, Picciotto, Charles E., additional, Pniewski, Jerzy, additional, Priou, Maurice P., additional, Reid, Roderick V., additional, Richardson, J.Reginald, additional, Roberts, David J., additional, Rodney, William S., additional, Romero, J.L., additional, Roy, Rene, additional, Saavedra, Igor, additional, Salzman, Gary C., additional, Sandhu, H.S., additional, Sauer, Peter U., additional, Saylor, Dwight P., additional, Schmid, Erich W., additional, Seitaro, Nakamura, additional, Shanley, Paul E., additional, Sharma, Tilak C., additional, Sherif, Helmy S., additional, Salomon, Martin, additional, Sandhas, Werner, additional, Sasakawa, Tatuya, additional, Saxon, David S., additional, Schick, Lee H., additional, Scrimaglio, Renato, additional, Seki, Seiji, additional, Shannon, Darwin L., additional, Shcherbakov, Yuri A., additional, Shively, Frank T., additional, Signell, Peter S., additional, Simonius, Markus, additional, Slaus, Ivo, additional, Slobodrian, Maria L.V.L., additional, Sobel, Michael I., additional, Sood, P.C., additional, Stephenson, Gerard J., additional, Sundquist, Bo, additional, Tagesen, Siegfried, additional, Thomann, Christoph E., additional, Simmons, James E., additional, Sitenko, A.G., additional, Sloan, I.H., additional, Slobodrian, Rodolfo, additional, Sober, Daniel I., additional, Spencer, James E., additional, Strottman, Daniel, additional, Sunier, Jules W., additional, Thiessen, Henry A., additional, Thompson, Gary, additional, Tin, Edmund S., additional, Tomas, Peter, additional, Treado, P.A., additional, Truoel, Peter, additional, Tzara, Christophe, additional, van Dantzig, René, additional, van Wageningen, Riek, additional, Vergados, Jannis D., additional, von Witsch, Wolfram H., additional, Wagner, Gerhard J., additional, Watson, John W., additional, Tjon, John A., additional, Tombrello, Thomas A., additional, True, William W., additional, Turchinetz, William E., additional, Ung-Thi, Tuyet-Anh, additional, van Oers, W.T.H., additional, Verba, John W., additional, Vogel, Petr, additional, Wapstra, Aaldert H., additional, Weidenmuller, Hans A., additional, Weiss, Morton S., additional, Werren, David, additional, Wielinga, Robert, additional, Willmes, Henry, additional, Wong, Chun W., additional, Yanabu, Takuji, additional, Young, John C., additional, Zeitnitz, Bernhard, additional, Zupancic, C., additional, Weneser, Joseph, additional, Westlund, Wayne A., additional, Wilkinson, Denys H., additional, Wolfe, David M., additional, Wright, Byron T., additional, Yuasa, Toshiko, additional, Zeiger, Enrique M., additional, and Zingl, H., additional
- Published
- 1972
- Full Text
- View/download PDF
13. PART I: LOVING ONE ANOTHER.
- Author
-
Iqbal, Alina, Davey, Peter, Selj, Milan, Nughes, Jay, and Absolute, Mistress
- Subjects
FIRST person narrative ,ENGLISH romance fiction - Published
- 2012
14. Synthesis and structure of single-crystal marcasite.
- Author
-
Jingwen Mao, Bierlein, Frank P., Drabek, Milan, and Rieder, Milan
- Abstract
Marcasite single crystals were synthesiz-ed directly by a reaction of aqueous solutions containing Fe2+ and Fe3+ with H2S and polysulphides at 200°C. It might be that natural marcasite formed according to some similar recipe, making use of an interaction of H2S and polysulphides with pore fluids containing Fe2+ or Fe3+ e.g. iron sulphates or chlorides. The structure of synthetic marcasite was refined from synchrotron diffraction data by the Rietveld method. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
15. Chapter 6 Molecular Computing with Deoxyribozymes.
- Author
-
Stojanovic, Milan N.
- Published
- 2008
- Full Text
- View/download PDF
16. Topologies of Approximation Spaces of Rough Set Theory.
- Author
-
Siciliano, Bruno, Khatib, Oussama, Groen, Frans, Huynh, Van-Nam, Nakamori, Yoshiteru, Ono, Hiroakira, Lawry, Jonathan, Kreinovich, Vkladik, Nguyen, Hung T., and Vlach, Milan
- Abstract
The main aim of this brief note is to explain relations between the classic approach to set approximations and recent proposals appearing in the literature on rough sets. In particular, relations between the standard topological concepts and basic concepts of rough set theory are considered. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
17. Virtual Liver Surgery Planning.
- Author
-
Baert, A. L., Knauth, M., Sartor, K., Neri, Emanuele, Caramella, Davide, Bartolozzi, Carlo, Sorantin, Erich, Werkgartner, Georg, Beichel, Reinhard, Bornik, Alexander, Reitinger, Bernhard, Popovic, Nikolaus, and Sonka, Milan
- Abstract
Liver tumors account for a considerable number of deaths every year (World Health Organization, 2004). One of type of primary liver tumors is hepatocellular carcinoma, which arises frequently as a complication of liver cirrhosis. Additionally, almost any tumor can seed metastasis within the liver, colorectal cancer being at the top of the list. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
18. Evolution of the Photographic Lens in the 19th Century.
- Author
-
Zahorcak, Milan
- Abstract
Chapter 2 of the book "Focal Encyclopedia of Photography: Digital Imaging, Theory and Applications, History, and Science," Fourth Edition, by Michael R. Peres is presented. It deals with the history, developments and applications concerning photography. It discusses advancement in technology regarding photographic technology. It focuses on the evolution of photography.
- Published
- 2007
19. Inverse Problem Solution in Acoustic Emission Source Analysis: Classical and Artificial Neural Network Approaches.
- Author
-
Delsanto, Pier Paolo, Prevorovsky, Zdenek, Chlada, Milan, and Vodicka, Josef
- Published
- 2007
- Full Text
- View/download PDF
20. In Vitro Reconstitution of Progesterone-Dependent RNA Transcription in Nuclear Extracts of Human Breast Carcinoma Cells.
- Author
-
Walker, John M., Tymms, Martin J., Bagchi, Milan K., Tsai, Sophia Y., and Ming-Jer Tsai
- Abstract
Steroid hormones, such as estrogen, progesterone, androgens, glucocorticoids, and mineralocorticoids, are well-known regulators of the expression of specific gene networks in higher eukaryotes (1-3). The hormonal action is mediated through specific intracellular receptor proteins that are functionally inactive in the absence of the hormone ligand. The hormonal response is initiated by the high-affinity binding of a steroid ligand to its cognate receptor. Hormone binding triggers a poorly understood structural activation of the receptor termed "transformation," which enables it to bind to specific enhancer sequences known as steroid response elements at the target gene. The receptor then modulates gene expression presumably by interacting with the transcription machinery at the target promoter. The precise mechanisms underlying the key molecular events in the steroid-induced gene activation pathway, such as ligand-induced activation of receptors and transactivation of target promoters by the activated receptors, have not been clearly resolved. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
21. Puritanism and Social Authoritarianism: Authoritarian Mastery of Civil Society.
- Author
-
Zafirovski, Milan
- Abstract
Puritanism is essentially a religious doctrine and institutional system of social- cultural, just as political, authoritarianism. Its social authoritarianism or totalitarianism is primarily expressed and grounded in its attempt at the total "mastery of the world" of civil society and/or culture. By analogy to its political rule, Puritanism achieved or purported total mastery of civil society aims to render Puritans factual or likely totalitarian "masters of the world," both of domestic and global culture, and all others their servants or tools. Puritanism does not confine its authoritarian mastery or domination to polity, as well as nature, technology, and economy, but seeks to extend it beyond these realms into civil society or cultural life in an effort to attain or approach its absolute, total, or maximal mastery of the world as a whole. Puritanism treats civil society, like polity and economy, as an element of the world to be mastered or dominated and thus subjected to its sectarian mastery or religiously factional domination, resulting in social, notably moral-religious, authoritarianism, including theocracy. In sociological terms, mastering or dominating civil society or culture is the integral part of the Puritan tendency toward the "mastery" or domination of the total social system. As Tawney (1962:198) notes evoking Weber, Puritanism in England and America "determined, not only conceptions of theology and church government, but political aspirations, business relations, family life and the minutia of personal behavior." Consequently, the Puritan "remakes not only his own character and habits and way of life, but family and church, industry and city, political institutions and social order" (Tawney 1962:199). [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
22. Authoritarian Legacy of Puritanism in Contemporary Society.
- Author
-
Zafirovski, Milan
- Abstract
Even if Puritanism actually and completely ended (as many think), for example, with the defeat of the English Puritan Revolution in the 1660s and, in particular, the official disestablishment of New England's theocracy by the Congregational Church in the 1830s, its legacy, vestige, or influence has been persisting, strong, and even crucial, primarily in America and secondarily Great Britain. In particular, the official disestablishment of New England's Puritan theocracy after exactly two long centuries of its existence (e.g., 1620s-30s to 1833) meant, to useWeber's terms, only the formal but not the substantive end of the overwhelming presence and salience of Puritanism in America. On the contrary. this is especially evident in the South that has, as seen, experienced a sort of neo-Puritan evangelical, specifically Baptist-Methodist renaissance during and in the wake of the Great Awakenings. In a sense, Puritanism has been both, to paraphrase Durkheim, the genesis and historical evolution, if not the future "manifest destiny," of America. Notably, by its enduring and cardinal legacy or influence, Puritanism remainsWeber's "most fateful" cultural force with, like capitalism, nearly "absolute power" (Horkheimer and Adorno 1993)—predictably, corrupting Puritans and their proxies "absolutely"— and blended with political conservatism, in America, above all its Southern and other ultraconservative ("red-neck") states during the early twenty-first century. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
23. Neo-Puritanism and Authoritarianism.
- Author
-
Zafirovski, Milan
- Abstract
The preceding chapters mostly focus on English and American paleo- or proto- Puritanism creating Great Britain's and New England's Holy Commonwealths respectively, and its affinity and convergence with authoritarianism or totalitarianism. This chapter focuses on subsequent and contemporary American or neo- Puritanism, as a variation of whatWeber describes as "Neo-Calvinism," insofar as Puritanism or Calvinism in Great Britain has almost vanished as a major player on the social stage or been relegated into discredit, oblivion, and irrelevance by tempering or competing forces like Anglicanism and liberalism (Munch 2001). [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
24. Puritanism and Social Authoritarianism Continued.
- Author
-
Zafirovski, Milan
- Abstract
In addition to and conjunction with its moral-religious forms, Puritan social authoritarianism comprises artistic-cultural and educational-scientific authoritarianisms, including authoritarian uses of knowledge, science, and art. Antiartistic or anticultural authoritarianism is an eminent attribute or outcome of Puritanism, grounded in and conjoined by its authoritarian morality and religion. By assumption, its moral and religious authoritarianisms tends to extend into and predict its antiartistic authoritarianism, i.e., the Puritan elimination or suppression of liberty in morality and religion into eliminating or suppressing freedom in the arts and other culture, just as the second reinforces via feedback effects the first. Puritan antiartistic authoritarianism has essentially moral-religious sources and rationalizations, as the suppression or restriction of personal freedom and creativity in the arts or aesthetic culture is induced and sanctified by the quest for Puritanical morality and godliness through purifying artists into saints, "godly" or monks in the service of the ultimately theocratic or totalitarian design of Puritanism. In turn, this anti artistic and anticultural, as well as moral-religious, authoritarianism leads to or reinforces, just as it reflects, Puritan authoritarian antihumanism or what Weber calls inhuman "inner-worldly asceticism" in general. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
25. Puritanism and Political Authoritarianism: Authoritarian Mastery of Politics.
- Author
-
Zafirovski, Milan
- Abstract
Puritanism essentially constitutes or engenders a theological-religious and institutional-social system of political authoritarianism. Its political authoritarianism is primarily manifested and founded in its specific attempt at the mastery of the world of politics. Puritanism attempted or realized total mastery of politics seeks to turn Puritans into potential or real totalitarian "masters of the world" a la Cromwell cum the "Lord Protector of the Realm" following the Puritan Revolution in England, both of the domestic and global political system, and all others their servants, subjects, or instruments. Puritanism considers politics, just as nature, economy, and civil society, part of this world and thus amenable to, as Tocqueville implies, its sectarian mastery or religiously factional, in Madison's meaning,1 domination. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
26. Puritanism and Authoritarianism.
- Author
-
Zafirovski, Milan
- Abstract
At this juncture, two types or meanings of Puritanism can be distinguished—general and specific. In general, Puritanism signifies an idea and practice of moral, religious, and other spiritual as well as material purity or purification: austerity, asceticism, rigor, perfection, virtuosity, holiness, sanctity and sainthood, absolutism, or totality, including total methodical control or absolute restraint of oneself and others. In the sense of methodically seeking and attaining purity or perfection in respect to human sins, vices, or evils, most ethical and religious systems are to some extent puritan, purist, or "Methodist." [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
27. Communication of Science, Communication in Science.
- Author
-
Claessens, Michel, Roffi, Giuseppe, d'Andrea, Luciano, Pasveer, Bernike, and Bufon, Milan
- Abstract
Copyright of Communicating European Research 2005 is the property of Springer eBooks and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2007
- Full Text
- View/download PDF
28. D-optimal Designs and Equidistant Designs for Stationary Processes.
- Author
-
Müller, Werner A., Bihn, Martina, López-Fidalgo, Jesús, Rodríguez-Díaz, Juan Manuel, Torsney, Ben, and Stehlík, Milan
- Abstract
In this paper we discuss the structure of the information matrices of D-optimal experimental designs for the parameters in a stationary process when the parametrized correlation structure satisfies mild conditions. Such conditions are easily fulfilled by many correlation structures, e.g. structures from power exponential family and some members of the Matérn class. We provide a lower bound for information on the mean parameter and prove it to be an increasing function of distances of design points. The design points can collapse under the presence of some covariance structures and a so called nugget effect can be employed in a natural way. We also show that the information of equidistant designs (designs with equally spaced design points) on the covariance parameter is increasing with the number of design points under our conditions on correlations. If only trend parameters are of interest, the designs covering the whole design space non-uniformly are rather efficient. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
29. Bridging Concrete and Abstract Syntax of Web Rule Languages.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Marchiori, Massimo, Pan, Jeff Z., Marie, Christian de Sainte, Milanović, Milan, and Gašević, Dragan
- Abstract
This paper proposes a solution for bridging abstract and concrete syntax of a Web rule language by using model transformations. Current specifications of Web rule languages such as Semantic Web Rule Language (SWRL) define its abstract syntax (e.g., EBNF notation) and concrete syntax (e.g., XML schema) separately. Although the recent research in the area of Model-Driven Engineering demonstrates that such a separation of two types of syntax is a good practice (due to the complexity of languages), one should also have tools that check validity of rules written in a concrete syntax with respect to the abstract syntax of the rule language. In this study, we use analyze the REWERSE I1 Rule Markup Language (R2ML) whose abstract syntax is defined by using metamodeling, while its textual concrete syntax is defined by using XML schema. We bridge this gap by a bi-directional transformation defined in a model transformation language (i.e., ATL). [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
30. Forensic Watermarking in Digital Rights Management.
- Author
-
Carey, M. J., Ceri, S., Bernstein, P., Dayal, U., Faloutsos, C., Freytag, J. C., Gardarin, G., Jonker, W., Krishnamurthy, V., Neimat, M. -A., Valduriez, P., Weikum, G., Whang, K. -Y., Widom, J., Petković, Milan, Jonker, Willem, van der Veen, Michiel, Lemma, Aweke, Celik, Mehmet, and Katzenbeisser, Stefan
- Abstract
In this chapter, we give a brief introduction to digital watermarking and discuss its applications in DRM systems. Watermarks are particularly useful in DRM systems due to their ability to bridge the gap between analog and digital domains. In playback control applications, a watermark is embedded in the master copy of a content and encodes associated usage rules, which are enforced by compliant devices during playback. On the other hand, in forensic tracking applications, a unique watermark is embedded in each individual copy of the content; this watermark allows the authorities to identify the source of an illegal copy. After discussing the basic principles of spread spectrum watermarks, we outline the architecture of an online content distribution system that employs watermarks in order to enable forensic tracking. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
31. DRM for Protecting Personal Content.
- Author
-
Carey, M. J., Ceri, S., Bernstein, P., Dayal, U., Faloutsos, C., Freytag, J. C., Gardarin, G., Jonker, W., Krishnamurthy, V., Neimat, M. -A., Valduriez, P., Weikum, G., Whang, K. -Y., Widom, J., Petković, Milan, Jonker, Willem, and Hong Li
- Abstract
Privacy is becoming a serious concern in the connected world. This chapter presents privacy issues, requirements and privacy protection concepts related to consumers' private content. First, privacy issues and requirements are described by means of several scenarios. Then, a DRM approach for protecting ownership and controlled sharing of private content is presented. A system is introduced for realizing such a privacy-enhancing approach for home media centers. Particular solutions for protecting and sharing personal content, ownership management, and content deletion in a privacy-preserving way are described. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
32. Malicious Software in Ubiquitous Computing.
- Author
-
Carey, M. J., Ceri, S., Bernstein, P., Dayal, U., Faloutsos, C., Freytag, J. C., Gardarin, G., Jonker, W., Krishnamurthy, V., Neimat, M. -A., Valduriez, P., Weikum, G., Whang, K. -Y., Widom, J., Petković, Milan, Jonker, Willem, and Swimmer, Morton
- Abstract
Malware (malicious software) is rampant in our information technology infrastructures and is likely to be so for the foreseeable future. We will look at various types of malware and their characteristics and see what defenses currently exist to combat them. Various aspects of ubiquitous computing will likely prove game-changers for malware and we will look into how the problem will evolve as ubiquitous computing (UbiComp) is deployed. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
33. RFID and Privacy.
- Author
-
Carey, M. J., Ceri, S., Bernstein, P., Dayal, U., Faloutsos, C., Freytag, J. C., Gardarin, G., Jonker, W., Krishnamurthy, V., Neimat, M. -A., Valduriez, P., Weikum, G., Whang, K. -Y., Widom, J., Petković, Milan, Jonker, Willem, and Langheinrich, Marc
- Abstract
Radio-frequency identification (RFID) technology has become one of the most hotly debated ubiquitous computing technologies, and public fears of its alleged capability for comprehensive surveillance have prompted a flurry of research trying to alleviate such concerns. The following chapter aims at introducing and briefly evaluating the range of proposed technical RFID privacy solutions. It also attempts to put the problem of RFID privacy into the larger perspective of both applications and policy, in order to properly assess the feasibility of the discussed solutions. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
34. Private Person Authentication in an Ambient World.
- Author
-
Carey, M. J., Ceri, S., Bernstein, P., Dayal, U., Faloutsos, C., Freytag, J. C., Gardarin, G., Jonker, W., Krishnamurthy, V., Neimat, M. -A., Valduriez, P., Weikum, G., Whang, K. -Y., Widom, J., Petković, Milan, Jonker, Willem, Tuyls, Pim, and Kevenaar, Tom
- Abstract
Biometrics is a convenient way to identify and authenticate individuals in an ambient world. This can only be done if biometric reference information is stored in the biometric system. Storing biometric reference information without any precautions will lead to privacy and security problems. In this chapter, we present technological means to protect the biometric information stored in biometric systems (biometric template protection). After describing the most important methods that can be used for template protection, the most promising method based on techniques from the field of secure key extraction will be described in more detail and example implementations will be given for every stage of the template protection process. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
35. Security and Privacy on the Semantic Web.
- Author
-
Carey, M. J., Ceri, S., Bernstein, P., Dayal, U., Faloutsos, C., Freytag, J. C., Gardarin, G., Jonker, W., Krishnamurthy, V., Neimat, M. -A., Valduriez, P., Weikum, G., Whang, K. -Y., Widom, J., Petković, Milan, Jonker, Willem, and Olmedilla, Daniel
- Abstract
The semantic Web aims to enable sophisticated and autonomic machine-to-machine interactions without human intervention, by providing machines not only with data but also with its meaning (semantics). In this setting, traditional security mechanisms are not suitable anymore. For example, identity-based access control assumes that parties are known in advance. Then, a machine first determines the identity of the requester in order to either grant or deny access, depending on its associated information (e.g., by looking up its set of permissions). In the semantic Web, any two strangers can interact with each other automatically and therefore this assumption does not hold. Hence, a semantically enriched process is required in order to regulate automatic access to sensitive information. Policy-based access control provides sophisticated means to support the protection of sensitive resources and information disclosure. This chapter provides an introduction to policy-based security and privacy protection by analyzing several existing policy languages. Furthermore, it shows how these languages can be used in a number of semantic Web scenarios. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
36. Privacy Policies.
- Author
-
Carey, M. J., Ceri, S., Bernstein, P., Dayal, U., Faloutsos, C., Freytag, J. C., Gardarin, G., Jonker, W., Krishnamurthy, V., Neimat, M. -A., Valduriez, P., Weikum, G., Whang, K. -Y., Widom, J., Petković, Milan, Jonker, Willem, Dekker, Marnix, Etalle, Sandro, and den Hartog, Jerry
- Abstract
Privacy is a prime concern in today's information society. To protect the privacy of individuals, enterprises must follow certain privacy practices while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website, processes it inside the enterprise and shares it with partner enterprises. In particular, we analyse three different privacy systems that can be used in the different stages of this lifecycle. One of them is the audit logic, recently introduced, which can be used to keep data private while travelling across enterprise boundaries. We conclude with an analysis of the features and shortcomings of these systems. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
37. The Persuasiveness of Ambient Intelligence.
- Author
-
Carey, M. J., Ceri, S., Bernstein, P., Dayal, U., Faloutsos, C., Freytag, J. C., Gardarin, G., Jonker, W., Krishnamurthy, V., Neimat, M. -A., Valduriez, P., Weikum, G., Whang, K. -Y., Widom, J., Petković, Milan, Jonker, Willem, Aarts, Emile, Markopoulos, Panos, and de Ruyter, Boris
- Abstract
Ambient intelligence (AmI) is a novel concept for embedded computing that builds on the large-scale integration of electronic devices into peoples' surroundings and the ubiquitous availability of digital information to the users of such environments. The concept however is not only concerned with the integration of computing in the background but, as a direct result of the disappearing computer and the corresponding interaction technologies, it calls for novel means of control that support the natural and intelligent use of such smart environments, emphasizing predominantly social aspects. As the familiar box-like devices are replaced by hidden functions embedded in the surroundings, the classical meaning and implication of security and trust needs to be revisited in the context of ambient intelligence. In this chapter, we briefly revisit the foundations of the AmI vision by addressing the role of AmIware, which refers to the basic and enabling AmI technologies, and by presenting some basic definitions of ambient intelligence. Next we discuss the meaning and role of persuasion on the basis of models and theories for motivation originating from cognitive science. Notions such as compliance and ambient journaling are used to develop an understanding of the concept of ambient persuasion. We also address the ethics of ambient intelligence from the point of view of a number of critical factors such as trust and faith, crossing boundaries, and changing realities. The chapter concludes with a summary of findings and some final remarks. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
38. Enhancing Privacy for Digital Rights Management.
- Author
-
Carey, M. J., Ceri, S., Bernstein, P., Dayal, U., Faloutsos, C., Freytag, J. C., Gardarin, G., Jonker, W., Krishnamurthy, V., Neimat, M. -A., Valduriez, P., Weikum, G., Whang, K. -Y., Widom, J., Petković, Milan, Jonker, Willem, Conrado, Claudine, and Schrijen, Geert-Jan
- Abstract
This chapter addresses privacy issues in DRM systems. These systems provide a means of protecting digital content, but may violate the privacy of users in that the content they purchase and their actions in the system can be linked to specific users. The chapter proposes a privacy-preserving DRM system in which users interact with the system in a pseudonymous way, while preserving all the security requirements of usual DRM systems. To achieve this goal, a set of protocols and methods is proposed for managing user identities and interactions with the basic system during the acquisition and consumption of digital content. Privacy-enhancing extensions are also proposed. Unlinkable purchase of content, which prevents content providers from linking all content purchased by a given user, is discussed. Moreover, a method that allows a user to transfer content rights to another user without the two users being linked by the content provider is provided. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
39. Person-Based and Domain-Based Digital Rights Management.
- Author
-
Carey, M. J., Ceri, S., Bernstein, P., Dayal, U., Faloutsos, C., Freytag, J. C., Gardarin, G., Jonker, W., Krishnamurthy, V., Neimat, M. -A., Valduriez, P., Weikum, G., Whang, K. -Y., Widom, J., Petković, Milan, Jonker, Willem, and Koster, Paul
- Abstract
This chapter discusses two important concepts in digital rights management (DRM). The first concept is authorized domains, which bind content to a domain allowing, content to be accessible on a set of devices. The second concept is person-based DRM, which binds content to a person and makes it available after authentication. Special focus is given to the combination of these concepts, which we call the personal entertainment domain (PED). We discuss the advantages and present the architecture of this concept. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
40. Digital Rights Management Interoperability.
- Author
-
Carey, M. J., Ceri, S., Bernstein, P., Dayal, U., Faloutsos, C., Freytag, J. C., Gardarin, G., Jonker, W., Krishnamurthy, V., Neimat, M. -A., Valduriez, P., Weikum, G., Whang, K. -Y., Widom, J., Petković, Milan, Jonker, Willem, and Kamperman, Frank
- Abstract
Digital rights management (DRM) interoperability is becoming a necessity due to the wide variety of content protection systems. DRM interoperability problems occur on three system layers: protected content, licenses, and trust and key management. Solutions for DRM interoperability can be based on format and platform interoperability. Furthermore, three interoperability case studies are discussed: DVB, Coral, and MPEG-IPMP(X), highlighting three typical DRM interoperability solutions. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
41. Copy Protection Systems.
- Author
-
Carey, M. J., Ceri, S., Bernstein, P., Dayal, U., Faloutsos, C., Freytag, J. C., Gardarin, G., Jonker, W., Krishnamurthy, V., Neimat, M. -A., Valduriez, P., Weikum, G., Whang, K. -Y., Widom, J., Petković, Milan, Jonker, Willem, and Talstra, Joop
- Abstract
The bulk of today's commercial audio and video content is distributed on (optical) media. As this business model is vulnerable to copying, the content is protected with some copy protection system (CPS) or other. In this chapter we look at the historic origins of Copy Protection and the basic technological ingredients of a CPS: media binding, broadcast encryption, and key hierarchies. Attention will also be devoted to auxiliary technologies such as watermarking and secure authenticated channels. We conclude with a review of new CPS components in upcoming protection systems. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
42. Accountable Anonymous Communication.
- Author
-
Carey, M. J., Ceri, S., Bernstein, P., Dayal, U., Faloutsos, C., Freytag, J. C., Gardarin, G., Jonker, W., Krishnamurthy, V., Neimat, M. -A., Valduriez, P., Weikum, G., Whang, K. -Y., Widom, J., Petković, Milan, Jonker, Willem, Diaz, Claudia, and Preneel, Bart
- Abstract
In this chapter we motivate the need for anonymity at the communication layer and describe the potential risks of having traceable communications. We then introduce the legal requirements on data retention and motivate the need for revocability of anonymity upon the request of law enforcement. We describe the main building blocks for anonymous communication and for anonymity revocation. We explain how these building blocks can be combined in order to build a revocable anonymous communication infrastructure that fulfills both privacy and law enforcement requirements. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
43. Client-Server Trade-Offs in Secure Computation.
- Author
-
Carey, M. J., Ceri, S., Bernstein, P., Dayal, U., Faloutsos, C., Freytag, J. C., Gardarin, G., Jonker, W., Krishnamurthy, V., Neimat, M. -A., Valduriez, P., Weikum, G., Whang, K. -Y., Widom, J., Petković, Milan, Jonker, Willem, Schoenmakers, Berry, and Tuyls, Pim
- Abstract
In the framework of secure computation based on threshold homomorphic cryptosystems, we consider scenarios in which a lightweight client device provides encrypted input to a secure computation to be performed on the server side. The computational power at the server side is assumed to be much higher than on the client side. We show how to trade-off work for the client against work for the server such that the total amount of work increases moderately. These client-server trade-offs are considered in detail for two applications: private biometrics and electronic voting. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
44. An Introduction to Digital Rights Management Systems.
- Author
-
Carey, M. J., Ceri, S., Bernstein, P., Dayal, U., Faloutsos, C., Freytag, J. C., Gardarin, G., Jonker, W., Krishnamurthy, V., Neimat, M. -A., Valduriez, P., Weikum, G., Whang, K. -Y., Widom, J., Petković, Milan, and Jonker, Willem
- Abstract
This chapter gives a concise introduction to digital rights management (DRM) systems by first presenting the basic ingredients of the architecture of DRM systems for (audio and/or video) content delivery, followed by an introduction to two open-standard DRM systems, one developed in the mobile world (Open Mobile Alliance DRM) and another one in the world of consumer electronics (Marlin). [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
45. Federated Identity Management.
- Author
-
Carey, M. J., Ceri, S., Bernstein, P., Dayal, U., Faloutsos, C., Freytag, J. C., Gardarin, G., Jonker, W., Krishnamurthy, V., Neimat, M. -A., Valduriez, P., Weikum, G., Whang, K. -Y., Widom, J., Petković, Milan, Jonker, Willem, Camenisch, Jan, and Pfitzmann, Birgit
- Abstract
The more real business and interaction with public authorities is performed in digital form, the more important the handling of identities over open networks becomes. The rise in identity theft as a result of the misuse of global but unprotected identifiers like credit card numbers is one strong indicator of this. Setting up individual passwords between a person and every organization he or she interacts with also offers very limited security in practice. Federated identity management addresses this critical issue. Classic proposals like Kerberos and PKIs never gained wide acceptance because of two problems: actual deployment to end users and privacy. We describe modern approaches that solve these problems. The first approach is browser-based protocols, where the user only needs a standard browser without special settings. We discuss the specific protocol types and security challenges of this protocol class, as well as what level of privacy can and cannot be achieved within this class. The second approach, private credentials, solves the problems that none of the prior solutions could solve, but requires the user to install some local software. Private credentials allow the user to reveal only the minimum information necessary to conduct transactions. In particular, it enables unlinkable transactions even for certified attributes. We sketch the cryptographic solutions and describe how optional properties such as revocability can be achieved, in particular in the idemix system. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
46. Different Search Strategies on Encrypted Data Compared.
- Author
-
Carey, M. J., Ceri, S., Bernstein, P., Dayal, U., Faloutsos, C., Freytag, J. C., Gardarin, G., Jonker, W., Krishnamurthy, V., Neimat, M. -A., Valduriez, P., Weikum, G., Whang, K. -Y., Widom, J., Petković, Milan, Jonker, Willem, and Brinkman, Richard
- Abstract
When private information is stored in databases that are under the control of others, the only possible way to protect it is to encrypt it before storing it. In order to efficiently retrieve the data, a search mechanism that still works over the encrypted data is needed. In this chapter an overview of several search strategies is given. Some add meta-data to the database and do the searching only in the metadata, others search in the data itself or use secret sharing to solve the problem. Each strategy has its own advantages and disadvantages. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
47. Strong Authentication with Physical Unclonable Functions.
- Author
-
Carey, M. J., Ceri, S., Bernstein, P., Dayal, U., Faloutsos, C., Freytag, J. C., Gardarin, G., Jonker, W., Krishnamurthy, V., Neimat, M. -A., Valduriez, P., Weikum, G., Whang, K. -Y., Widom, J., Petković, Milan, Jonker, Willem, Tuyls, Pim, and Škorić, Boris
- Abstract
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic key material in an unclonable way. They can be employed for strong authentication of objects, e.g., tokens, and of persons possessing such tokens, but also for other purposes. We give a short overview of security applications where PUFs are useful, and discuss physical realisations, noisy measurements and information content of PUFs. Then we describe an integrated authentication token containing an optical PUF, a challenging mechanism and a detector. Finally, we discuss authentication protocols for controlled and uncontrolled PUFs. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
48. Statistical Database Security.
- Author
-
Carey, M. J., Ceri, S., Bernstein, P., Dayal, U., Faloutsos, C., Freytag, J. C., Gardarin, G., Jonker, W., Krishnamurthy, V., Neimat, M. -A., Valduriez, P., Weikum, G., Whang, K. -Y., Widom, J., Petković, Milan, Jonker, Willem, Brankovic, Ljiljana, and Giggins, Helen
- Abstract
Statistical database security focuses on the protection of confidential individual values stored in so-called statistical databases and used for statistical purposes. Examples include patient records used by medical researchers, and detailed phone call records, statistically analyzed by phone companies in order to improve their services. This problem became apparent in the 1970s and has escalated in recent years due to massive data collection and growing social awareness of individual privacy. The techniques used for preventing statistical database compromise fall into two categories: noise addition, where all data and/or statistics are available but are only approximate rather than exact, and restriction, where the system only provides those statistics and/or data that are considered safe. In either case, a technique is evaluated by measuring both the information loss and the achieved level of privacy. The goal of statistical data protection is to maximize the privacy while minimizing the information loss. In order to evaluate a particular technique it is important to establish a theoretical lower bound on the information loss necessary to achieve a given level of privacy. In this chapter, we present an overview of the problem and the most important results in the area. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
49. Privacy-Preserving Data Mining.
- Author
-
Carey, M. J., Ceri, S., Bernstein, P., Dayal, U., Faloutsos, C., Freytag, J. C., Gardarin, G., Jonker, W., Krishnamurthy, V., Neimat, M. -A., Valduriez, P., Weikum, G., Whang, K. -Y., Widom, J., Petković, Milan, Jonker, Willem, Brankovic, Ljiljana, Islam, Md. Zahidul, and Giggins, Helen
- Abstract
Despite enormous benefits and the extremely fast proliferation of data mining in recent years, data owners and researchers alike have acknowledged that data mining also revives old and introduces new threats to individual privacy. Many believe that data mining is, and will continue to be, one of the most significant privacy challenges in years to come. We live in an information age where vast amounts of personal data are regularly collected in the process of bank transactions, credit-card payments, making phone calls, using reward cards, visiting doctors and renting videos and cars, to mention but a few examples. All these data are typically used for data mining and statistical analysis and are often sold to other companies and organizations. A breach of privacy occurs when individuals are not aware that the data have been collected in the first place, have been passed onto other companies and organizations, or have been used for purposes other than the one for which they were originally collected. Even when individuals approve of use of their personal records for data mining and statistical analysis, for example in medical research, it is still assumed that only aggregate values will be made available to researchers and that no individual values will be disclosed. Various techniques can be employed in order to ensure the confidentiality of individual records and other sensitive information. They include adding noise to the original data, so that disclosing perturbed data does not necessarily reveal the confidential individual values. Some techniques were developed specifically for mining vertically and/or horizontally partitioned data. In this scenario each partition belongs to a different party (e.g., a hospital), and no party is willing to share their data but they all have interest in mining the total data set comprising all of the partitions. There are other techniques that focus on protecting confidentiality of logic rules and patterns discovered from data. In this chapter we introduce the main issues in privacy-preserving data mining, provide a classification of existing techniques and survey the most important results in this area. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
50. Trusted Platforms.
- Author
-
Carey, M. J., Ceri, S., Bernstein, P., Dayal, U., Faloutsos, C., Freytag, J. C., Gardarin, G., Jonker, W., Krishnamurthy, V., Neimat, M. -A., Valduriez, P., Weikum, G., Whang, K. -Y., Widom, J., Petković, Milan, Jonker, Willem, and Kursawe, Klaus
- Abstract
This chapter describes some of the basic mechanism of building trusted platforms, i.e., platforms that behave in a way they are expected to. The main focus is the low-level implementation of such mechanism using secure hardware, including the trusted computing standard, security mechanisms inside the central processor unit (CPU) and external secure coprocessors. After describing the advantages and limits of these approaches, the chapter describes some basic services set up on such hardware, such as secure boot, remote attestation, and secure I/O interfaces. Finally, we briefly discuss secure operating systems, and point out some future trends in secure hardware and trusted platform. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.