|
|
Creator | Title | Description | Subject | Date |
26 |
|
Mallat, Chibli | Jaafar al-Sadr : A Confluence Prime Minister for Iraq | In Iraq and the wider Middle East, Jaafar needs no introduction. His father, Mohammad Baqer al-Sadr, was the most remarkable Islamic thinker of the 20th century. He was executed without trial by Saddam Hussein, together with Jaafar?s aunt Bint al-Huda, on 8 April 1980. His cousin and brother-in-law ... | | 2010-08-19 |
27 |
|
Francis, Leslie | Ensuring the privacy and confidentiality of electronic health records | In 2004, President Bush announced his plan to ensure that most Americans would have electronic health records within ten years. Although substantial progress has been made toward achieving that goal, this progress has primarily reflected institutional interests and priorities by focusing on system ... | | 2007 |
28 |
|
Ogburn, Joyce L. | Acquiring minds want to know: information policies and intellectual property | As librarians, vendors, and publishers, we deal with information every day, and we have developed policies to govern the acquisition and use of this information. Information policies on campuses have tended to focus on computing issues and information technology. Information policies give a lot of a... | Information policies; Information access; Computing; Free speech; Academic freedom | 1998 |
29 |
|
Spencer S. Eccles Health Sciences Library, University of Utah | IAIMS Newsletter InfoFair 1997 Spring Supplement | The IAIMS Newsletter provides valuable information about Library activities and resources as well as informative articles related to information technology. | IAIMS | 1997-03-19 |
30 |
|
Nesdill, Daureen | Electronic lab notebooks: What librarians need to know | Multidisciplinary projects and increased collaborations with colleagues worldwide increases the complexity of managing projects. Even managing the projects over the course of a career is cumbersome. ELNs provide an efficient system of organizing the work, the data and related documentation. Finding ... | Electronic Lab Notebooks: Data; Collaboration; Security; Documentation; Data Management Plans; Marketing | 2013 |
31 |
|
Mallat, chibli | Is Israel a Democracy? It's conditional | This is a serious discussion to be undertaken on a world level on the type of system that Israel is, as serious indeed as the legal investigation carried out in the mid-1960s on the legal nature of the apartheid regime in South Africa. In the early 1960s, Yale Law Journal published a long, two-pa... | | 2009-12-10 |
32 |
|
Kowaleski-Jones, Lori | Influence of participation in the national school lunch program and food insecurity on child well-being | This study examines two research questions: the child- and family-specific factors that predict food insecurity and participation in the National School Lunch Program (NSLP) and the effects on school-age children of food insecurity and participating in the NSLP. Results show that factors representin... | Children's nutrition; Children's diet; Child development | 2003-03 |
33 |
|
Firmage, Edwin B. | Arms control in the 70's | ... and they shall beat their swords into plowshares, and their spears into pruninghooks: nation shall not lift up sword against nation, neither shall they learn war any more. (Isa. 2:4.) The vision of a time of peace-a time in which man's genius and his physical resources would be devoted entirel... | | 1971 |
34 |
|
Lombardo, Nancy T.; Bramble, John | PDA operating system comparison | A LIFT Forum presentation. The purpose of the Library and Information Technology Forum is to inform the University of Utah community about electronic information resources, and current trends in the use of computers and online technologies for accessing these resources | PDA; Personal Digital Assistants; Computers, Handheld | 2002-10-09 |
35 |
|
Mallat, Chibli | The Special Tribunal for Lebanon, the staring abyss and what must be done about it | The STL, the UN and Lebanon must all contribute to avert an explosive situation in the country | | 2010-10-07 |
36 |
|
Guiora, Amos | Teaching an Old Dog New Tricks: Operationalizing the Law of Armed Conflict in New Warfare | Gone are the days of soldiers facing each other across large battlefields, tanks shelling tanks, and fighter jets engaging in dogfights. War, or armed conflict, to use a more precise legal term, now takes place everywhere in cities, refugee camps and other historically non-military areas and invol... | | 2010-05-13 |
37 |
|
Mallat, Chibli | Obama's just war speech: Three questions for 'the Middle East in the United States' | Congo, Zimbabwe, North Korea, Sin Kiang and Honduras, are hot spots that have turned or are likely to turn violent. But the Middle East is different in two ways. It is the longest continuously war-ridden area in modern history. And at least since September 11, it has become a domestic American issue... | | 2009-12-24 |
38 |
|
Nebeker, Jonathan R. | pSCANNER: Patient-centered scalable national network for effectiveness research | This article describes the patient-centered Scalable National Network for Effectiveness Research (pSCANNER), which is part of the recently formed PCORnet, a national network composed of learning healthcare systems and patient-powered research networks funded by the Patient Centered Outcomes Research... | | 2014-01-01 |
39 |
|
Golden, Kenneth M. | Bounds on the complex permittivity of matrix-particle composites | The complex effective dielectric constant E* of matrix-particle composites is considered. Such composites consist of separated inclusions of material of type one embedded in a matrix of material of type two. The analytic continuation method is used to derive a series of bounds which incorporate a n... | Random; Parameters; Continuation | 1995 |
40 |
|
Stoller, Leigh B. | Low latency workstation cluster communications using sender-based protocols | The use of workstations on a local area network to form scalable multicomputers has become quite common. A serious performance bottleneck in such "carpet clusters" is the communication protocol that is used to send data between nodes. We report on the design and implementation of a class of communic... | Workstations; Scalable multicomputers; Sender-based; Communication protocols | 1996 |
41 |
|
Paiva, Marie Clare P. | Quick glimpse at public and academic libraries in Addis Ababa, Ethiopia | Ethiopia's 80 million people continue to live in a country with poor infrastructure in the Horn of Africa region. The population of Addis Ababa is estimated at 10-15 million and libraries have just recently been given some recognition. When I first came to this country as an ALA-USIA Fellow in... | Libraries; Africa; Ethiopia | 2008 |
42 |
|
Francis, Leslie | Accommodating every body | This Article contends that workplace accommodations should be predicated on need or effectiveness instead of group-identity status. It proposes that, in principle, "accommodating every body" be achieved by extending Americans with Disabilities Act-type reasonable accommodation to all work-capable me... | | 2014-01-01 |
43 |
|
Svedin, Lina | Crisis management in Russia: overcoming institutional rigidity and resource constraints | The editors would like to express their gratitude to a number of persons and institutions for making this book on Russian crisis management possible. We are grateful for the generous financial support from the Swedish Agency for Civil Emergency Planning (?CB) which has made the CM Europe program (of... | | 2002 |
44 |
|
Evans, David | Graphical man/machine communications: November 1969 | Semi-Annual Technical Report 1 June 1969 - 30 November 1969 | | 1969-11 |
45 |
|
Kasera, Sneha K. | Enhancing covert communications with multiple colluding receivers | Traditional (single receiver) system setup: ? Choose exploit field (e.g. last byte of TCP Timestamp) ? Alice: probabilistically inject parts of coded message into field ? Bob: extract symbols from field, decode to correct errors ?Warden: assume full knowledge of system and keys Can we create un... | | 2010-10-06 |
46 |
|
Chibli Wajdi Mallat 1960- | March 2221 : Lebanon's Cedar Revolution : an essay on non-violence and justice | Scanned book. | | 2007 |
47 |
|
Randy L. Dyer; Alex Boren; Marianne Carpenter; Isabelle Ghabash; Tanner Gould; Lindsai Gren; Niki Harris; Theresa Krause; Candance Oman; Allie Tripp; Tianna Tu; Corper James | TRANSPARENCY PRIVACY CLASHING PARADIGMS IN A WEB 2.0 WORLD | A University of Utah Honors Think Tank 2012 | | 2012 |
48 |
|
Zimmer, Zachary | Gray agendas: interest groups and public pensions in Canada, Britain, and the United States, by Henry J. Pratt | Gray Agendas, by Wayne State University's Henry J. Pratt, is an in-depth and well-structured examination of the historical development of pension policy and its impact on interest groups in three countries over the last century: Canada, Britain, and the United States. It is of interest to political... | Gray agendas; Book review; Pratt, Henry J.; United States; Canada; Great Britain | 1995 |
49 |
|
Kasera, Sneha K. | On fast and accurate detection of unauthorized wireless access points using clock skews | We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind using clock skews is to overcome one of the major limitations of existing solutions-the inability to effectively detect Mediu... | Clock skews; Unauthorized access; Medium access control; MAC; Address spoofing; Wireless networks; Time Synchronization Function; TSF | 2010-03 |
50 |
|
Gelfand, Donna M. | Preschool assessment of attachment: construct validity in a sample of depressed and nondepressed families. | Construct validity of the newly developed Preschool Assessment of Attachment (PAA) was examined in a sample of depressed and nondepressed mothers and their preschoolers, focusing on attachment related differences in children's general caregiving environments, maternal psychosocial functioning, and c... | Preschoolers; Families; Maternal, psychosocial functioning; Mothers; Children, caregiving; Attachment | 1997-07 |