Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Peer Reviewed
See detailTruffle Pigs, Research Questions, and Histories of Education
Tröhler, Daniel UL

in Popkewitz, Thomas (Ed.) Rethinking the History of Education. Transnational perspectives on its questions, methods, and knowledge (2013)

Detailed reference viewed: 92 (1 UL)
Full Text
See detailTrügerisches Gedächtnis
Reuter, Bob UL

Article for general public (2014)

Detailed reference viewed: 18 (4 UL)
Full Text
See detailTrumpland
Scuto, Denis UL

Article for general public (2016)

Detailed reference viewed: 39 (7 UL)
Full Text
Peer Reviewed
See detailTruncation mutations in ABCA1 suppress normal upregulation of full-length ABCA1 by 9-cis-retinoic acid and 22-R-hydroxycholesterol
Wellington, C. L.; Yang, Y. Z.; Zhou, S. et al

in Journal of Lipid Research (2002), 43(11), 1939-1949

Mutations in ABCA1 uniformly decrease plasma HDL-cholesterol (HDL-C) and reduce cholesterol efflux, yet different mutations in ABCA1 result in different phenotypic effects in heterozygotes. For example ... [more ▼]

Mutations in ABCA1 uniformly decrease plasma HDL-cholesterol (HDL-C) and reduce cholesterol efflux, yet different mutations in ABCA1 result in different phenotypic effects in heterozygotes. For example, truncation mutations result in significantly lower HDL-C and apoliprotein A-I (apoA-I) levels in heterozygotes compared with nontruncation mutations, suggesting that truncation mutations may negatively affect the wild-type allele. To specifically test this hypothesis, we examined ABCA1 protein expression in response to 9-cis-retinoic acid (9-cis-RA) and 22-R-hydroxycholesterol (22-R-OH-Chol) in a collection of human fibroblasts representing eight different mutations and observed that truncation mutations blunted the response to oxysterol stimulation and dominantly suppressed induction of the remaining full-length allele to 5–10% of wild-type levels. mRNA levels between truncation and nontruncation mutations were comparable, suggesting that ABCA1 expression was suppressed at the protein level. Dominant negative activity of truncated ABCA1 was recapitulated in an in vitro model using transfected Cos-7 cells. Our results suggest that the severe reduction of HDL-C in patients with truncation mutations may be at least partly explained by dominant negative suppression of expression and activity of the remaining full-length ABCA1 allele. [less ▲]

Detailed reference viewed: 32 (0 UL)
Full Text
Peer Reviewed
See detailTrust and Trustworthiness in Anonymous Virtual Worlds
Füllbrunn, Sascha UL; Richwien, Katharina; Sadrieh, Abdolkarim

in Journal of Media Economics (2011), 24(1), 48-63

Virtual communities like Second Life (SL) represent an economic factor with increasing potential, but may induce behavior that deviates from real-world experience. This article introduces a new ... [more ▼]

Virtual communities like Second Life (SL) represent an economic factor with increasing potential, but may induce behavior that deviates from real-world experience. This article introduces a new experimental design that is based on the trust game (Berg, Dickhaut, & McCabe, 1995), but eliminates the problem of multiple virtual identities. One treatment of the experiment in the virtual world SL was conducted and the results compared to the First Life (FL) control treatment, which was conducted on a university campus. In SL, significantly lower investment levels were found, but significantly higher average returns were found than in the FL treatment or in the literature. It is conjectured that the disparity between trusting and trustworthy behavior is a sign that the social structure in SL is still evolving. It seems plausible that the trustors in a young and developing society cautiously test the extent of trustworthiness, whereas the trustees strategically invest in levels of trustworthiness that are higher than in settled societies to build up a trustworthy environment. [less ▲]

Detailed reference viewed: 54 (0 UL)
Full Text
Peer Reviewed
See detailTrust Based Interdependency Weighting for On-line Risk Monitoring in Interdependent Critical Infrastructures
Caldeira, F.; Schaberreiter, Thomas UL; Varrette, Sébastien UL et al

in International Journal of Secure Software Engineering (2013), 4(4), 47-69

Detailed reference viewed: 61 (4 UL)
See detailTrust Dynamics: Beliefs, Preferences, Learning and Performance
Cortesi, Maurizio UL

Doctoral thesis (2012)

Detailed reference viewed: 51 (5 UL)
Full Text
See detailTrust et Fiducie au Luxembourg
Prüm, André UL

in Trust et Fiducie au Luxembourg (2005)

L’internationalisation des rapports juridiques conduit de plus en plus à une imbrication des systèmes juridiques et à la nécessité de reconnaître des institutions juridiques venus d’ailleurs. L’une de ces ... [more ▼]

L’internationalisation des rapports juridiques conduit de plus en plus à une imbrication des systèmes juridiques et à la nécessité de reconnaître des institutions juridiques venus d’ailleurs. L’une de ces institutions, le trust, né dans le système de la common law, s’exporte de plus en plus dans les pays de tradition civiliste. Pour faciliter son acclimatation, la Convention de la Haye relative à la loi applicable au trust et à sa reconnaissance a été adoptée le 1er juillet 1985. Cette Convention entend à la fois permettre la reconnaissance de cette institution par des ordres juridiques qui ne la connaissent pas et fixer à l'égard des pays signataires la loi applicable au trust. A l’aube de sa ratification par la Suisse, des experts venus de différents pays se sont réunis à l’Institut suisse de droit comparé (Lausanne) le 18 mars 2005 pour partager les expériences nationales. Le présent ouvrage publie les rapports exposés à cette occasion. [less ▲]

Detailed reference viewed: 184 (7 UL)
See detailTrust et fiducie. La Convention de La Haye et la nouvelle législation luxembourgeoise
Prüm, André UL; Witz, Claude; Aynès, Laurent

Book published by Montchrestien (2005)

Le présent ouvrage reproduit les actes du colloque de Luxembourg du 11 décembre 2003 consacré au trust et à la nouvelle fiducie luxembourgeoise. D'éminents spécialistes du trust et de la Convention de La ... [more ▼]

Le présent ouvrage reproduit les actes du colloque de Luxembourg du 11 décembre 2003 consacré au trust et à la nouvelle fiducie luxembourgeoise. D'éminents spécialistes du trust et de la Convention de La Haye du 1er juillet 1985 éclairent utilement cette institution clé des pays de Common Law et les solutions de droit international posées par la Convention. La confrontation du trust avec les pays de droit civil est approfondie à la lumière de l'expérience du Grand-Duché qui a ratifié la Convention de La Haye tout en procédant à une réforme substantielle de la fiducie luxembourgeoise. Les auteurs de l'avant-projet de loi présentent en détail la loi du 27 juillet 2003 relative au trust et aux contrats fiduciaires dont l'étude est complétée par l'examen du traitement fiscal. L'ouvrage s'adresse à tous ceux qui s'intéressent au trust et à la fiducie notamment en France, en Belgique et en Suisse où l'on songe à ratifier la Convention de La Haye et à consacrer législativement la fiducie. [less ▲]

Detailed reference viewed: 122 (5 UL)
Full Text
Peer Reviewed
See detailA trust framework for evaluating GNSS signal integrity
Chen, Xihui UL; Lenzini, Gabriele UL; Martins, Miguel et al

in Proceedings of 26th IEEE Computer Security Foundations Symposium (CSF'13) (2013)

Detailed reference viewed: 167 (4 UL)
Full Text
Peer Reviewed
See detailTrust in Abstract Argumentation
Boella, Guido UL; van der Torre, Leon UL; Villata, Serena

in Proceedings of the 4th Mahasarakham International Workshop on Artificial Intelligence (MIWAI'10) (2010)

Detailed reference viewed: 21 (0 UL)
Full Text
Peer Reviewed
See detailA trust-augmented voting scheme for collaborative privacy management
Sun, Yanjie UL; Zhang, Chenyi UL; Pang, Jun UL et al

in Proc. 6th International Workshop on Security and Trust Management (2011)

Detailed reference viewed: 38 (1 UL)
Full Text
Peer Reviewed
See detailA trust-augmented voting scheme for collaborative privacy management
Sun, Yanjie UL; Zhang, Chenyi UL; Pang, Jun UL et al

in Journal of Computer Security (2012), 20(4), 437-459

Detailed reference viewed: 36 (5 UL)
Full Text
Peer Reviewed
See detailTrustworthy agent-based recommender system in a mobile P2P environment
Sahli, N.; Lenzini, Gabriele UL; Eertink, H.

in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2012), 6573 LNAI

Current major P2P systems focus on PCs and do not provide services for the mobile environment. Compared to traditional P2P, characteristics of Mobile P2P include unreliable connections, limited bandwidth ... [more ▼]

Current major P2P systems focus on PCs and do not provide services for the mobile environment. Compared to traditional P2P, characteristics of Mobile P2P include unreliable connections, limited bandwidth and constraints of mobile devices. In addition, nomadic users demand applications and services that are context-aware, personalised, secure, and trustworthy. Recommender systems are one of these applications. In this paper, we aim at building a mobile P2P recommender system which dramatically reduces wireless traffic between peers, brings trustworthiness (each peer can choose to rely on opinions of peers whom he trusts), and ffers unobtrusiveness (the target system is mainly autonomous and requires a minimum user intervention). Our solution is based on multi-agent systems and is illustrated on a slow-food restaurant recommender system. © 2012 Springer-Verlag. [less ▲]

Detailed reference viewed: 38 (2 UL)
Full Text
Peer Reviewed
See detailTrustworthy exams without trusted parties
Bella, Giampaolo; Giustolisi, Rosario; Lenzini, Gabriele UL et al

in Computer and Security (2017), 67

Historically, exam security has mainly focused on threats ascribed to candidate cheating. Such threats have been normally mitigated by invigilation and anti-plagiarism methods. However, as recent exam ... [more ▼]

Historically, exam security has mainly focused on threats ascribed to candidate cheating. Such threats have been normally mitigated by invigilation and anti-plagiarism methods. However, as recent exam scandals confirm, also invigilators and authorities may pose security threats. The introduction of computers into the different phases of an exam, such as candidate registration, brings new security issues that should be addressed with the care normally devoted to security protocols. This paper proposes a protocol that meets a wide set of security requirements and resists threats that may originate from candidates as well as from exam administrators. By relying on a combination of oblivious transfer and visual cryptography schemes, the protocol does not need to rely on any trusted third party. We analyse the protocol formally in ProVerif and prove that it verifies all the stated security requirements. [less ▲]

Detailed reference viewed: 85 (5 UL)
Peer Reviewed
See detailTrying to square a circle: A theoretically embedded test for measuring complex problem solving
Greiff, Samuel UL; Funke, Joachim

Scientific Conference (2009, August)

Detailed reference viewed: 35 (2 UL)
Full Text
Peer Reviewed
See detailTTCA: an R package for the identification of differentially expressed genes in time course microarray data
Albrecht, Marco UL; Stichel, Damian; Müller, Benedikt et al

in BMC Bioinformatics (2017), 18(1), 33

Background: The analysis of microarray time series promises a deeper insight into the dynamics of the cellular response following stimulation. A common observation in this type of data is that some genes ... [more ▼]

Background: The analysis of microarray time series promises a deeper insight into the dynamics of the cellular response following stimulation. A common observation in this type of data is that some genes respond with quick, transient dynamics, while other genes change their expression slowly over time. The existing methods for detecting significant expression dynamics often fail when the expression dynamics show a large heterogeneity. Moreover, these methods often cannot cope with irregular and sparse measurements. Results: The method proposed here is specifically designed for the analysis of perturbation responses. It combines different scores to capture fast and transient dynamics as well as slow expression changes, and performs well in the presence of low replicate numbers and irregular sampling times. The results are given in the form of tables including links to figures showing the expression dynamics of the respective transcript. These allow to quickly recognise the relevance of detection, to identify possible false positives and to discriminate early and late changes in gene expression. An extension of the method allows the analysis of the expression dynamics of functional groups of genes, providing a quick overview of the cellular response. The performance of this package was tested on microarray data derived from lung cancer cells stimulated with epidermal growth factor (EGF). Conclusion: Here we describe a new, efficient method for the analysis of sparse and heterogeneous time course data with high detection sensitivity and transparency. It is implemented as R package TTCA (transcript time course analysis) and can be installed from the Comprehensive R Archive Network, CRAN. The source code is provided with the Additional file 1. [less ▲]

Detailed reference viewed: 100 (21 UL)
Full Text
See detailTU DO@50 -- ein froher Wunsch für die Zukunft
Hesse, Markus UL

in Gruehn, Dietwald; Reicher, Christa; Wiechmann, Thorsten (Eds.) 50 Jahre Dortmunder Raumplanung (2019)

Detailed reference viewed: 13 (0 UL)
Full Text
Peer Reviewed
See detailTumaco: Collaboration of Mobile Devices in Hypermedia-based In-Vehicle Infotainment Systems
Grevisse, Christian UL; Rothkugel, Steffen UL

in Libro de Actas del XXI Congreso Argentino de Ciencias de la Computación (CACIC 2015) (2015)

In-Vehicle Infotainment systems nowadays are largely limited to one-to-one relationships with the drivers' mobile phone. In this paper, we propose Tumaco, a SOA-based IVI system, which enables the ... [more ▼]

In-Vehicle Infotainment systems nowadays are largely limited to one-to-one relationships with the drivers' mobile phone. In this paper, we propose Tumaco, a SOA-based IVI system, which enables the seamless integration of all devices of all passengers. Collaborative services can be executed within a cross-platform ecosystem through the use of semantic hypermedia. In addition, passengers may customize their own user experience in order to reduce mental workload. Our prototypical implementation showed the benefits of opening the user experience to all passengers on a car. Finally, we present a framework that enables developers to provide their own services within our ecosystem. [less ▲]

Detailed reference viewed: 112 (25 UL)