| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910782785603321 |
|
|
Autore |
Johnson Robert L |
|
|
Titolo |
Assessing Performance [[electronic resource] ] : Designing, Scoring, and Validating Performance Tasks |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
New York, : Guilford Publications, 2008 |
|
|
|
|
|
|
|
ISBN |
|
1-281-96336-4 |
9786611963361 |
1-60623-079-4 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (368 p.) |
|
|
|
|
|
|
Altri autori (Persone) |
|
PennyJames A |
GordonBelita |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Employees |
Employees - Rating of |
Educational evaluation - Evaluation |
Performance |
Commerce |
Business & Economics |
Marketing & Sales |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di contenuto |
|
Front matter; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; Chapter 6; Chapter 7; Chapter 8; Chapter 9; Chapter 10; Glossary; References; Author Index; Subject Index; About the Authors |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
A comprehensive resource for assessment practitioners, this book provides step-by-step guidance for developing, administering, scoring, and validating a range of performance tasks, including literacy and other types of proficiency assessments. The authors explore how to establish the purpose of the assessment and how to develop scoring tools, train raters, reduce rater bias, review scores and report results, and use item-level and test-level analyses to optimize reliability and validity. Clearly written and well organized, the book includes many practical ex |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910254838303321 |
|
|
Autore |
Nachef Valerie |
|
|
Titolo |
Feistel Ciphers : Security Proofs and Cryptanalysis / / by Valerie Nachef, Jacques Patarin, Emmanuel Volte |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
|
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2017.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XV, 309 p. 39 illus., 6 illus. in color.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data encryption (Computer science) |
Mathematical statistics |
Computer science—Mathematics |
Computer science - Mathematics |
Cryptology |
Probability and Statistics in Computer Science |
Mathematical Applications in Computer Science |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references at the end of each chapters. |
|
|
|
|
|
|
Nota di contenuto |
|
Part 1 Definitions and first security results -- Chapter 1 Classical Feistel ciphers, first properties -- Chapter 2 Generalized Feistel ciphers, first properties -- Chapter 3 Luby-Rackoff Theorems -- Chapter 4 The coefficient H method -- Part 2 Generic Attacks -- Chapter 5 Introduction to cryptanalysis -- Chapter 6 Classical Feistel ciphers -- Chapter 7 Contracting Feistel ciphers -- Chapter 8 Expanding Feistel ciphers -- Chapter 9 Generalized Feistel ciphers -- Chapter 10 Classical Feistel ciphers with internal permutations -- Part 3: DES and other specific Feistel ciphers -- Chapter 11 DES (Definition, differential and linear cryptanalysis of DES) -- Chapter 12 3DES with 2 keys -- Chapter 13: XDES, 3DES with 3 keys -- Chapter 14 Bear-Lion, Cast, RC6, MARS, Coconut, Simon, Lucifer -- Part 4 Improved security results -- Chapter 15 Proofs beyond the birthday bound with the coupling method -- Chapter 16 Proofs beyond the birthday bound with the coefficient H method -- Chapter 17 Proofs based on games -- Chapter 18 Indifferentiability. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book provides a comprehensive survey of different kinds of Feistel ciphers, including their definition and mathematical/computational properties. Feistel Networks form the base design of the Data Encryption Standard algorithm, a former US NIST standard block cipher, originally released in 1977, and the framework used by several other symmetric ciphers ever since. The results consolidated in this volume provide an overview of this important cipher design to researchers and practitioners willing to understand the design and security analysis of Feistel ciphers. |
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910254658603321 |
|
|
Autore |
Powers James S |
|
|
Titolo |
Creating a Value Proposition for Geriatric Care : The Transformation of American Healthcare / / by James S. Powers |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2017.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (VII, 54 p. 3 illus.) |
|
|
|
|
|
|
Collana |
|
SpringerBriefs in Health Care Management and Economics, , 2193-1704 |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Geriatric nursing |
Health services administration |
Geriatric Care |
Health Care Management |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references at the end of each chapters. |
|
|
|
|
|
|
Nota di contenuto |
|
Table of Contents -- 1. Introduction -- 2. US Geriatrics -A Historical Perspective -- 3. Incentives -- 4. Strategies -- 5. Development of VA Geriatrics Programs -- 6. Development of University Geriatrics Programs -- 7. Selling to Management – Outpatient and Community Programs -- 8. Selling to Management – Inpatient Programs -- 9. Prologue. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book creates a value proposition in geriatric care - a promise of value to be delivered to improve care and to provide specific benefits to |
|
|
|
|
|
|
|
|
|
|
healthcare systems. It describes strategies and understanding of the incentives, barriers encountered in promoting changes in the healthcare systems, and discusses numerous examples and outcomes. Drawn from many fields such as medicine and science, sociology, politics, business and economics, the book helps guide the introduction of geriatric principles into mainstream medical care with the goal of improving the care and quality of life of older persons in all healthcare systems. |
|
|
|
|
|
| |