00886nam0-22003251i-450-99000744107040332120130917125933.0000744107FED01000744107(Aleph)000744107FED0100074410720030529d1963----km-y0itay50------baengGBy-------001yyPolitical economyOskar LangeOxfordPergamon Press1963v.24 cm1.: General problems / transl. from the Polish by A.H. WalkerLange,Oskar<1904-1965>48485ITUNINARICAUNIMARCBK990007441070403321XV B 41472332FGBCISVE B0/1987DECTSISVE D0.65DECTSFGBCDECTSPolitical economy46913UNINA02559nam 22005774 450 991045815210332120210111222123.01-280-95086-20-335-22436-9(CKB)1000000000361474(EBL)287826(SSID)ssj0000167646(PQKBManifestationID)11163632(PQKBTitleCode)TC0000167646(PQKBWorkID)10177677(PQKB)10428351(OCoLC)246969360(MiAaPQ)EBC287826(EXLCZ)99100000000036147420130923h20052005 uy 0engurcn#---|||||txtrdacontentcrdamediacrrdacarrierHandbook of health research methods investigation, measurement and analysis /edited by Ann Bowling and Shah EbrahimMaidenhead :Open University Press/McGraw-Hill Education,2005.©2005.1 online resource (xii, 625 pages) illustrations0-335-21460-6 Includes bibliographical references and index.This handbook helps researchers to plan, carry out, and analyse health research, and evaluate the quality of research studies. The book takes a multidisciplinary approach to enable researchers from different disciplines to work side-by-side in the investigation of population health, the evaluation of health care, and in health care delivery. Handbook of Health Research Methods is an essential tool for researchers and postgraduate students taking masters courses, or undertaking doctoral programmes, in health services evaluation, health sciences, health management, public health, nursing, sociology, socio-biology, medicine and epidemiology. However, the book also appeals to health professionals who wish to broaden their knowledge of research methods in order to make effective policy and practice decisions.Medical careResearchPublic healthResearchHealthResearchMethodologyMedical careResearch.Public healthResearch.HealthResearchMethodology.362.1072610.72Bowling AnnEbrahim ShahAU-PeELAU-PeELAU-PeELAuAdUSACaOWtUBOOK9910458152103321Handbook of health research methods2084693UNINA02083oam 2200517zu 450 991037651970332120210807002018.0(CKB)3170000000003080(SSID)ssj0001120361(PQKBManifestationID)11698431(PQKBTitleCode)TC0001120361(PQKBWorkID)11159932(PQKB)10579287(WaSeSS)IndRDA00011367(Association for Computing Machinery)10.1145/1967486(EXLCZ)99317000000000308020160829d2010 uy engur|||||||||||txtccriiWAS2010 : the 12th International Conference on Information Integration and Web-Based Applications & Services : November 8-10, 2010, Paris, France[Place of publication not identified]ACM20101 online resource (895 pages)ACM Other conferencesBibliographic Level Mode of Issuance: Monograph1-4503-0421-4 ACM Other conferencesiiWAS2010 :the 12th International Conference on Information Integration and Web-Based Applications and Services : November 8-10, 2010, Paris, FranceProceedings of the 12th International Conference on Information Integration and Web-based Applications & ServicesElectrical & Computer EngineeringHILCCEngineering & Applied SciencesHILCCTelecommunicationsHILCCElectrical & Computer EngineeringEngineering & Applied SciencesTelecommunicationsPardede Eric893354Taniar DavidKotsis GabrieleAssociation for Computing Machinery-Digital Library.PQKBBOOK9910376519703321IiWAS2010 : the 12th International Conference on Information Integration and Web-Based Applications & Services : November 8-10, 2010, Paris, France1995615UNINA05280nam 22009135 450 991048373380332120251226203353.03-540-85538-610.1007/978-3-540-85538-5(CKB)1000000000490855(SSID)ssj0000319321(PQKBManifestationID)11265733(PQKBTitleCode)TC0000319321(PQKBWorkID)10337092(PQKB)11399216(DE-He213)978-3-540-85538-5(MiAaPQ)EBC3063536(MiAaPQ)EBC6511627(Au-PeEL)EBL6511627(OCoLC)1166255366(PPN)128126256(EXLCZ)99100000000049085520100301d2008 u| 0engurnn|008mamaatxtccrPairing-Based Cryptography – Pairing 2008 Second International Conference, Egham, UK, September 1-3, 2008, Proceedings /edited by Steven Galbraith, Kenny Paterson1st ed. 2008.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2008.1 online resource (XI, 377 p.) Security and Cryptology,2946-1863 ;5209Includes index.3-540-85503-3 Includes bibliographical references and index.Invited Talks -- Pairings in Trusted Computing -- Pairing Lattices -- The Uber-Assumption Family -- Cryptography I -- Homomorphic Encryption and Signatures from Vector Decomposition -- Hidden-Vector Encryption with Groups of Prime Order -- Mathematics -- The Hidden Root Problem -- Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography -- Computing the Cassels Pairing on Kolyvagin Classes in the Shafarevich-Tate Group -- Constructing Pairing Friendly Curves -- Constructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic Field -- Constructing Pairing-Friendly Elliptic Curves Using Factorization of Cyclotomic Polynomials -- A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian Varieties -- Pairing-Friendly Hyperelliptic Curves with Ordinary Jacobians of Type y 2?=?x 5?+?ax -- Implementation of Pairings -- Integer Variable ?–Based Ate Pairing -- Pairing Computation on Twisted Edwards Form Elliptic Curves -- Exponentiation in Pairing-Friendly Groups Using Homomorphisms -- Generators for the ?-Torsion Subgroup of Jacobians of Genus Two Curves -- Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms -- Pairings on Hyperelliptic Curves with a Real Model -- Hardware Implementation -- Faster Implementation of ? T Pairing over GF(3 m ) Using Minimum Number of Logical Instructions for GF(3)-Addition -- A Comparison between Hardware Accelerators for the Modified Tate Pairing over and -- Cryptography II -- One-Round ID-Based Blind Signature Scheme without ROS Assumption -- Tracing Malicious Proxies in Proxy Re-encryption -- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities.This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, Pairing 2008, held in London, UK, in September 2008. The 20 full papers, presented together with the contributions resulting from 3 invited talks, were carefully reviewed and selected from 50 submissions. The contents are organized in topical sections on cryptography, mathematics, constructing pairing-friendly curves, implementation of pairings, and hardware implementation.Security and Cryptology,2946-1863 ;5209CryptographyData encryption (Computer science)Computer programmingAlgorithmsComputer scienceMathematicsDiscrete mathematicsData structures (Computer science)Information theoryCryptologyProgramming TechniquesAlgorithmsDiscrete Mathematics in Computer ScienceData Structures and Information TheorySymbolic and Algebraic ManipulationCryptography.Data encryption (Computer science).Computer programming.Algorithms.Computer scienceMathematics.Discrete mathematics.Data structures (Computer science).Information theory.Cryptology.Programming Techniques.Algorithms.Discrete Mathematics in Computer Science.Data Structures and Information Theory.Symbolic and Algebraic Manipulation.005.8254.62bclPaterson Kenneth G.1969-Galbraith Steven D.International Conference on Pairing-Based CryptographyMiAaPQMiAaPQMiAaPQBOOK9910483733803321Pairing-Based Cryptography – Pairing 2008774467UNINA