176 - 200 of 506
Number of results to display per page
CreatorTitleDescriptionSubjectDate
176 Firmage, Edwin B.Inner-outer speaks outDuring 1965 and 1966, I worked as an assistant to Vice President Hubert Humphrey and, in addition, participated in a program that permitted 15 young men to enjoy informal suppers and extended off-the-record chats with the President in the White House, attend frequent sessions with the Vice Preside...White House Fellows; Hubert Humphrey; Vietnam1967
177 Goldberg, Robert A.Kathryn S. Olmsted. Real enemies: conspiracy theories and American Democracy, World War I to 9/11In 1963, historian Richard Hofstadter donned the clinician's white coat to describe conspiracy theorists and a "paranoid style of American politics" given to exaggeration, distortion, and fantastical thinking. If still the favorite of journalists, Hofstadter's ideas have been significantly revised ...2010-04
178 McDaniel, SusanPublic policy, demographic aging and familiesVoodoo demographics, a term coined by American economist James Schulz in the late 1980s, describes the belief that aging populations pose threats to life and society as we know it, particularly to social safety nets, education, public health care, as well as challenges to families. Surprisingly, the...1998
179 McDaniel, SusanWhy generation(s) matter(s) to policyGeneration is a packed social concept, with immense explanatory capacity and policy utility, yet it is a concept fraught with misunderstanding in both the social sciences and in popular usage. It is no less fraught in policy. This short overview paper has three objectives: • 1) to explore gener...Social policy; Aging; Generation2007-11-13
180 Li, MinqiDialogue on the future of ChinaThree Chinese scholars speak to the question: How do you think the June 4th movement of 1989 will be remembered-----as another May 4th 1919, the threshold of a period of general political awakening and turbulence, or instead as a Chinese version of 1848 or 1968 in Europe: a last spontaneous explosio...China; Politics; Social conditions1999
181 Wolfinger, Nicholas H.Dispelling the pipeline myth: gender, family formation, and alternative trajectories in the academic life courseAcademic careers have traditionally been conceptualized as pipelines, through which young scholars move continuously from graduate school to tenure-track positions. This understanding often fails to capture the experiences of female Ph.D. recipients, who take ladder-rank assistant professorships at ...Careers, academic; Tenure; Teaching, higher education; Employment2006-07-20
182 Zimmer, ZacharyLiving arrangements of older adults in the developing world: an analysis of DHS household surveysUsing data from Demographic and Health Surveys, this study examines living arrangements of older adults in 43 developing countries and compares patterns by gender, world regions, and macro-level measures of socioeconomic development. Indicators include household size, headship, relationship to head...Demographic and Health Surveys; Living arrangements; Older adults2001
183 Boll, Steven F.Selected methods for improving synthesis speech quality using linear predictive coding: system description, coefficient smoothing and streakThis report develops two generalizations of the standard Linear Predictive Coding (LPC) implementation of a narrow band speech compression system. The purpose of each method is to improve the speech quality that is available from a standard LPC system.Linear Predictive Coding; LPC; Speech compression system; Pitch excited system1974
184 Gardner, Reed M.Computerized Clinical Decision-Support in Respiratory CareBiomedical Informatics2004
185 Freire, JulianaMetaComm: a meta-directory for telecommunicationsA great deal of corporate data is buried in network devices - such as PBX messaging/email platforms, and data networking equipment - where it is difficult to access and modify. Typically, the data is only available to the device itself for its internal purposes and it must be administered using eith...MetaComm; Meta-Directories; Directory Enabled Networking; Data integration2000
186 Fan, Jessie X., Yu, ZhouUnderstanding Aging and Consumer Fraud Victimization in the Chinese Context: A Two-Stage Conceptual ApproachThe relationship between aging and consumer fraud victimization is mixed in the literature. Most studies based on survey data have found older consumers less likely to be fraud victims, while a few studies have found older consumers more likely to be victimized, especially with certain fraud types. ...Consumer financial fraud; fraud exposure; fraud victimization; fraud delivery methods; China
187 Firmage, Edwin B.Shanties, symbolic speech, and the public forum: ramshackle protection for free expressionShanties, symbolizing student opposition to South African apartheid and the demand that United States universities divest from corporations doing business in South Africa, were the sit-ins of the 1980s. Silent but graphic, shanties challenged the established order and attracted media attention. Som...Civil demonstration; Civil protest; First Amendment; Civil liberties1990
188 Spencer S. Eccles Health Sciences Library, University of UtahIAIMS Newsletter Summer 2001The IAIMS Newsletter provides valuable information about Library activities and resources as well as informative articles related to information technology.IAIMS2001-05-17
189 Mastrangelo, Carlos H.Personal navigation via shoe mounted inertial measurement unitsWe are developing a personal micronavigation system that uses high-resolution gait-corrected inertial measurement units. The goal of this project is to develop a navigation system that use secondary inertial variables, such as velocity, to enable long-term precise navigation in the absence of Global...2010
190 Freire, JulianaSiphoning hidden-web data through keyword-based interfacesIn this paper, we study the problem of automating the retrieval of data hidden behind simple search interfaces that accept keyword-based queries. Our goal is to automatically retrieve all available results (or, as many as possible). We propose a new approach to siphon hidden data that automatically ...2004-01-01
191 Carter, John B.Supporting persistent C++ objects in a distributed storage systemWe have designed and implemented a C++ object layer for Khazana, a distributed persistent storage system that exports a flat shared address space as its basic abstraction. The C++ layer described herein lets programmers use familiar C++ idioms to allocate, manipulate, and deallocate persistent share...persistent C++ objects; distributed storage; Khazana; flat shared address space1999
192 Olson, Susan M. (Susan Marie), 1949-Revisiting Informal Justice: Restorative Justice and Democratic ProfessionalismDebates over informal or popular justice recur periodically in sociolegalInformal justice; Sociolegal scholarship; Professionalism; Democratic professionalism; Salt Lake City Passages Program2003
193 Silverman, Randall H.Tsunami and Archives: The Unexpected Possibilities; Jakarta, Indonesia 17-18 July 2006The International Gathering on Tsunami and Archives, sponsored by the National Archives of the Republic of Indonesia (ANRI) and the International Council on Archives (ICA), was held in Jakarta, Indonesia 17-18 July 2006. The event was conducted in English and Indonesian and provided a venue for arch...Natural disasters; Tsunami; Preservation; Book repair2007
194 McDaniel, SusanBorn at the right time?: gendered generations and webs of entitlement and responsibilityAnalyses of social change and challenge in sociologies for women often start with some attention to generation. Yet, generation per se has been an underconceptualized sociological construct as a structural dimension of stratification, particularly gender stratification, or as a lens through which...Generation; Gender; Women2001
195 Firmage, Edwin B.Law of presidential impeachmentThis Article will focus upon four influences that together determine the law of presidential impeachment: English law; the Constitutional Convention and state ratifying conventions; American impeachment experience; and public policy considerations. It is the public policy considerations upon which ...Wrongdoing; Executive branch1973
196 Diamond, LisaSex, dating, passionate friendships, and romance: intimate peer relations among lesbian, gay, and bisexual adolescentsAlthough the raw number of adolescent romantic and sexual involvements is well documented, the actual experience and meaning of these relationships for adolescents receives little attention. As a result, these relationships are frequently classed together on the basis of surface similarities, despi...Teenagers; Relationships; Sex; Dating; Romance; Gays; Lesbians; Bisexuals1999
197 Spencer S. Eccles Health Sciences Library, University of UtahIAIMS Newsletter Fall 1998The IAIMS Newsletter is published three times a year (August, January, May) with one InfoFair supplement and provides valuable information about Library activities and resources as well as informative articles related to information technology.IAIMS1998-08-12
198 Riloff, Ellen M.Learning extraction patterns for subjective expressionsThis paper presents a bootstrapping process that learns linguistically rich extraction patterns for subjective (opinionated) expressions. High-precision classifiers label unannotated data to automatically create a large training set, which is then given to an extraction pattern learning algorithm. T...Bootstrapping process; Extraction patterns; Subjective expressions; Opinions2003
199 Henderson, Thomas C.Monte Carlo sensor networksBiswas et al. [1] introduced a probabilistic approach to inference with limited information in sensor networks. They represented the sensor network as a Bayesian network and performed approximate inference using Markov Chain Monte Carlo (MCMC). The goal is to robustly answer queries even under no...Monte Carlo sensor networks; Markov Chain Monte Carlo; MCMC2005-01-20
200 Lenart, Joshua BelaThe Blue Castle project: a feasibility study of the proposed nuclear power plant in Emery County, Utah along the Green RiverWith an increasing population in Utah, specifically in the Salt Lake Valley, the demand for energy is rapidly growing each year. Currently, Utah's electric grid is largely produced by burning coal, natural gas, and other fossil fuels. In the past, supplying Utahns with electricity from these forms h...Blue Castle; Utah; Nuclear power plant; Emery County2015-08
176 - 200 of 506