652 research outputs found

    Initiative and Referendum, Carter v. Celebrezze

    Get PDF
    At the beginning of the twentieth century, the process of popular legislation through the use of initiative and referendum measures gained popularity in the United States. It was during this period that twelve states, including Ohio, adopted the measures of initiative and referendum. Theodore Roosevelt advocated the adoption of these measures at the Ohio Constitutional Convention of 1912 where the Ohio legislature enacted provisions for the use of these methods of popular legislation

    Predictive Validity of the Brief Fearof Negative Evaluation Subscales

    Get PDF
    From the Washington University Senior Honors Thesis Abstracts (WUSHTA), Spring 2018. Published by the Office of Undergraduate Research. Joy Zalis Kiefer, Director of Undergraduate Research and Associate Dean in the College of Arts & Sciences; Lindsey Paunovich, Editor; Helen Human, Programs Manager and Assistant Dean in the College of Arts and Sciences Mentor: Tom Rodenbaug

    Efficacy and safety of risedronate 150 mg once a month in the treatment of postmenopausal osteoporosis

    Get PDF
    Fragility fractures that occur as a result of osteoporosis are frequently associated with chronic pain and decreased quality of life as well as significant morbidity and mortality. Fracture reduction, however, is often less than optimal due to poor compliance with medications. Studies have demonstrated that risedronate, a heterocyclic nitrogen containing bisphosphonate can reduce vertebral, nonvertebral, and hip fracture incidence in postmenopausal women, in men, and in subsets of older patients at great risk of falls and fragility. The mechanism, efficacy, dosing options, and tolerability of risedronate are reviewed

    The Monster Approaching the Capital: The Effort to Write Economic Policy Into The United States Constitution

    Get PDF
    It is not within the scope of this comment to answer all the above issues. The focus of this paper will be a review of solutions suggested by Constitutional scholars with an emphasis on current proposed legislation. The Constitutional Implementation Act of 198116 (hereinafter S.817) and S.J. Res. 58.17 The current Congressionally-proposed amendment will be discussed in relation to the state applications. A brief review of the legislative history behind Article V will highlight the current efforts by Congress to provide some procedural guidelines for a state-summoned convention. Finally, the provisions of the various state applications will be compared. As a preface to this discussion, the nature and activities of the organizations credited with sponsoring this movement will be addressed

    Tissue Reservoirs of HIV-1: Insights from the Central Nervous System

    Get PDF
    Cellular and anatomical reservoirs of HIV-1 preclude a cure to infection. Efforts to characterize these reservoirs are an important part of developing a strategy to eradicate all forms of HIV-1. The central nervous system (CNS) is a unique bodily compartment that can support viral replication independent of that in the blood (compartmentalization) and may be an anatomical reservoir of unique viruses. In this β€˜proof of principle’ study, we characterized viral sequences (RNA and provirus) from the blood, cerebrospinal fluid, brain, and liver of two infected donors who died with HIV-1-associated dementia and disparate states of viral replication (compartmentalized versus equilibrated). We show that selective pressures exist within CNS and liver tissue to drive expansion of particular viral species. We found macrophage-tropic viral lineages archived in the brain, implicating macrophages as a potential cellular reservoir. By including more donors and tissues, our study provides insight towards HIV-1 reservoirs and cure research.Master of Scienc

    Specialized scales in the cloacal region of two Paleozoic fishes (Crossopterygii)

    Get PDF
    Modified scales in the cloacal region of two osteolepid rhipidistians are described for the first time. A specimen of Megalichthys sp. (from the Pennsylvanian of Ohio), consisting of an isolated portion of the pelvic region, shows five enlarged scales along the ventral midline: two sets of paired flanking scales and one unpaired central scale. There is no direct evidence of the cloaca in this specimen. In the only known specimen of Sterropterygion brandei (from the Upper Devonian of Pennsylvania), the cloacal position is preserved, and there is one pair of enlarged scales flanking the opening. The modified scales in both genera are interpreted as being secondary sexual characteristics. The apparent absence of scales modified for reproductive functions in other fossil taxa is discussed

    On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations

    Full text link
    We ask whether an Identity Based Encryption (IBE) sys-tem can be built from simpler public-key primitives. We show that there is no black-box construction of IBE from Trapdoor Permutations (TDP) or even from Chosen Ci-phertext Secure Public Key Encryption (CCA-PKE). These black-box separation results are based on an essential prop-erty of IBE, namely that an IBE system is able to compress exponentially many public-keys into a short public parame-ters string. 1

    Password Mistyping in Two-Factor-Authenticated Key Exchange

    Get PDF
    Abstract: We study the problem of Key Exchange (KE), where authentication is two-factor and based on both electronically stored long keys and human-supplied credentials (passwords or biometrics). The latter credential has low entropy and may be adversarily mistyped. Our main contribution is the first formal treatment of mistyping in this setting. Ensuring security in presence of mistyping is subtle. We show mistyping-related limitations of previous KE definitions and constructions. We concentrate on the practical two-factor authenticated KE setting where servers exchange keys with clients, who use short passwords (memorized) and long cryptographic keys (stored on a card). Our work is thus a natural generalization of Halevi-Krawczyk and Kolesnikov-Rackoff. We discuss the challenges that arise due to mistyping. We propose the first KE definitions in this setting, and formally discuss their guarantees. We present efficient KE protocols and prove their security
    • …
    corecore