376 - 400 of 867
Number of results to display per page
CreatorTitleDescriptionSubjectDate
376 Utz, Rebecca L.Procedure to correct proxy-reported weight in the National Health Interview Survey, 1976-2002Background: Data from the National Health Interview Survey (NHIS) show a larger-than-expected increase in mean BMI between 1996 and 1997. Proxy-reports of height and weight were discontinued as part of the 1997 NHIS redesign, suggesting that the sharp increase between 1996 and 1997 may be artifactua...National Health Interview Survey; NHIS; Proxy-reported weight2009
377 Lombardo, Nancy T.; Mower, Allyson; McFarland, Mary M.Putting wikis to work in librariesWikis are part of the suite of Web 2.0 technologies enhancing collaboration and communication. This article describes the ways in which one academic health sciences library has utilized wiki software. The Eccles Health Sciences Library has found wikis to be valuable collaboration tools. Case scenari...Collaboration; Libraries; Web 2.0 technology; Wikis2008-06-02
378 Schliep, KarenCritical analysis of information: an epidemiologic perspectiveA slideshow presentation discussing methods for critically evaluating medical literature and observational studiesLife sciences literature--Evalutation2017-04-21
379 Pascucci, ValerioExtreme-scale visual analyticsThe September/October 2004 CG&A introduced the term visual analytics (VA) to the computer science literature.1 In 2005, an international advisory panel with representatives from academia, industry, and government defined VA as "the science of analytical reasoning facilitated by interactive visual in...2012-01-01
380 Paiva, Marie Clare P.Quick glimpse at public and academic libraries in Addis Ababa, EthiopiaEthiopia's 80 million people continue to live in a country with poor infrastructure in the Horn of Africa region. The population of Addis Ababa is estimated at 10-15 million and libraries have just recently been given some recognition. When I first came to this country as an ALA-USIA Fellow in...Libraries; Africa; Ethiopia2008
381 Anderson, Richard BryanBiz of Acq--To license or not to license: that really ought to be the questionOf the many changes that the electronic information revolution has brought to library acquisitions, perhaps none is as significant as the licensing agreement. For centuries, copyright law set forth the legal parameters under which libraries appropriated and disseminated information products and ser...Electronic information; Contracts; Libraries; Copyright1999
382 Couldwell, William T.Hemorrhagic and nonhemorrhagic Rathke cleft cysts mimicking pituitary apoplexyObject. Rathke cleft cysts (RCCs) are infrequently symptomatic, and apoplexy is one of the most unusual presentations. Only a few cases of apoplexy associated with RCCs have been reported, and their clinical, imaging, surgical, and pathological features are poorly understood. In the cases that have ...2008-01-01
383 Freire, Juliana; Silva, Claudio T.Managing the evolution of dataflows with VisTrailsScientists are now faced with an incredible volume of data to analyze. To successfully analyze and validate various hypotheses, it is necessary to pose several queries, correlate disparate data, and create insightful visualizations of both the simulated processes and observed phenomena. Data explor...VisTrails; Dataflows; Provenance management2006
384 Neatrour, Anna; Brunsvik, Matt; Buckner, Sean; McBride, Brian; Myntti, JeremyThe SIMP Tool: Facilitating Digital Library, Metadata, and Preservation Workflow at the University of Utah's J. Willard Marriott LibraryThis article presents a case study of the Submission Information Metadata Packaging (SIMP) tool developed at the University of; Utah's J. Willard Marriott Library. The Library designed this platform-independent tool to facilitate the deposit of descriptive; metadata and derivative formats into CONTE...Metadata; Workflow - Management; Digital Libraries2014
385 Hibler, Michael J.The flask security architecture: system support for diverse security policiesOperating systems must be flexible in their support for security policies, i.e., the operating system must provide sufficient mechanisms for supporting the wide variety of real-world security policies. Systems claiming to provide this support have failed to do so in two ways: they either fail to pro...Flask; Security architecture1998
386 Henderson, Thomas C.Agent-based engineering drawing analysisInterpretation of paper drawings has received a good deal of attention over the last decade. Related areas such as direct interpretation of human drawings (HCI), search and indexing of graphics databases, and knowledge representation in the domain of graphics and drawing understanding have also s...Interpretation; Human drawings; HCI; Graphic databases2002-02-04
387 Mitchell, Joyce A.Effect of physician reminders on preventive care: meta-analysis of randomized clinical trialsThe objective of this study was to assess the clinical value of the physician reminder, an information intervention, in increasing compliance for selected preventive health care measures. Meta-analysis was used to combine the quantitative evidence from randomized controlled clinical trials meeting t...1994-01-01
388 Craigle, ValeriLegal Scholarship in the Digital Domain: A Technical Roadmap for implementing the Durham StatementLegal Scholarship in the Digital Domain: A Technical Roadmap for implementing the Durham Statement2010-12
389 Malloy, Thomas E.MERLOT: a faculty-focused website of educational resourcesThe Multimedia Educational Resource for Learning and Online Teaching (MERLOT) is a community of academic institutions, professional discipline organizations, and individual people building a collection of Web-based teaching and learning resources where faculty can easily find peer-reviewed material...Multimedia Educational Resource for Learning and Online Teaching; MERLOT; Digital learning materials2001
390 Ogburn, Joyce L.On anthropology and the internet (discussion and criticism)The Internet as a topic has taken over our professional lives as much as the Internet as a reality. Its application to anthropology deserves a timely and thorough exploration. The article on it by Brian Schwimmer (CA 37:561-68) is dated December 1995, and in the absence of information on how recent...Searching online; Website searching; Human history and culture1997
391 Coley, Phyllis D.On turning green into goldAnthropogenic effects on the climate and biodiversity of our planet are among the most troubling and perhaps irreversible threats facing scientists, policymakers, and citizens. Yet many scientists are reluctant or unsure of how to apply their expertise in basic science to these pressing real-world p...Bioprospecting; Drug discovery; Active compounds; Panama2008
392 Hillyard, David R.Quantitative real time PCR assay for detecting BK virus in serum, plasma and urine.BK is a non-enveloped virus in the Polyomavirus family, closely related to SV40 and JC virus. Primary infection with BK generally occurs during childhood without specific symptoms, and is widespread in the population, with approximately 80% of adults infected globally. The virus remains latent in th...Quantitative Tests; Linearity Studies; Oligonucleotides2005-05-02
393 Research in brief: Winter 2003-2004Summaries of Selected Research Projects at the University of Utah Health Sciences CenterResearch: School of Medicine, College of Pharmacy;, College of Nursing, College of Health2003-12
394 Research in brief: Winter 2005Summaries of Selected Research Projects at the University of Utah Health Sciences CenterResearch: School of Medicine, College of Pharmacy;, College of Nursing, College of Health2005-12
395 Neatrour, Anna; Myntti, JeremyWestern name authority file: An open data approach to digital collections authority controlA presentation conducted at the NISO Open Data Virtual Conference in 2018.Metadata2018-06-13
396 Myntti, JeremyWestern name authority file: Linking people and corporate bodiesPresentation about Digital Library Services grant at the ALCTS Linked Library Data Interest Group at ALA Midwinter in Denver, Colorado.Regional authority control; Metadata2018-02-10
397 Myntti, JeremyWestern Name Authority File: Preparing Charles Savage for Linked DataPresentation given at the 2017 OLAC Conference, Linked Data Initiatives Panel, in Richmond, VA.Name authority records (Information retrieval); Linked data; Metadata2017-10-28
398 Codding, Brian F.A land of work: foraging behavior and ecologyWork is a core theme in many of the major issues and debates in California archaeology. Work is central in understanding why the first Californians entered the region (e.g., Erlandson, this volume): how thousands of years of work following colonization resulted in the overexploitation of particular ...Human behavioral ecology; Hunter-gatherer; North America: California2012-03-15
399 Zhang, Kang; Yang, Zhenglin; Jiang, LiMutations in LRP5 or FZD4 underlie the common familial exudative vitreoretinopathy locus on chromosome 11qFamilial exudative vitreoretinopathy (FEVR) is an inherited blinding disorder of the retinal vascular system. Autosomal dominant FEVR is genetically heterogeneous, but its principal locus, EVR1, is on chromosome 11q13-q23. The gene encoding the Wnt receptor frizzled-4 (FZD4) was recently reported ...Familial exudative vitreoretinopathy; FEVR; Inherited blinding disorders2004
400 Gerig, GuidoToward a comprehensive framework for the spatiotemporal statistical analysis of longitudinal shape dataThis paper proposes an original approach for the statistical analysis of longitudinal shape data. The proposed method allows the characterization of typical growth patterns and subject-specific shape changes in repeated time-series observations of several subjects. This can be seen as the extension ...2013-01-01
376 - 400 of 867