Andres Reyes Marin | I.U Colegio Mayor de Antioquia (original) (raw)
Uploads
Papers by Andres Reyes Marin
Aquatic Conservation: Marine and Freshwater Ecosystems, 2015
1. Bottom-up participatory processes to create and manage no-take marine protected areas have bee... more 1. Bottom-up participatory processes to create and manage no-take marine protected areas have been proposed as a way to scale-up marine conservation and deal with the lack of support and compliance of top-down conservation approaches. However, bottom-up conservation does not always lead to positive outcomes, thus it is increasingly important to understand the conditions that determine the establishment and implementation of these initiatives. 2. Establishment and implementation processes were compared empirically for two contrasting bottom-up no-take marine protected areas that have been developing under the same political setting, however, one has been successful and the other has stalled. 3. Using mixed methods, stakeholders’ (a) motivations to participate in the no-take marine protected area initiatives, (b) communication, support and information flow networks, (c) perceived participation, and (d) satisfaction with the establishment process of the bottom-up no-take marine protected areas, were assessed. 4. Non-significant differences were found between the two initiatives in terms of stakeholders’ motivations to create a no-take marine protected area. 5. Significant differences were found in stakeholders’ communication, support and information flow networks, in addition to differences in participation, and satisfaction with the establishment and implementation process. 6. Results highlight that for the implementation and consolidation of bottom-up no-take marine protected areas initiatives, common interests do not necessarily lead to common action, partnerships will not emerge automatically in response to potential benefits. 7. Understanding disparities in participation, information sharing and communication are key aspects which must be considered for creating and supporting successful marine protected areas based on bottom-up participatory processes.
Revista Española de Enfermedades Digestivas, 2008
Cirugía Española (English Edition), 2015
ABSTRACT
Proceedings of ASP-DAC'95/CHDL'95/VLSI'95 with EDA Technofair, 1995
Here you can sign in to your guest, member or subscriber accounts. ... Cookies must be enabled to... more Here you can sign in to your guest, member or subscriber accounts. ... Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options. ... Grass, W.; Grobe, C.; Lenk, S.; Tiedemann, W.-D.; Kloos, CD; Marin, A.; ...
Cultura - Hombre - Sociedad CUHSO, 2012
2010 IEEE International Conference on Consumer Electronics (ICCE 2010), 2010
DLNA can be considered as a good candidate for sharing protected contents among authorized device... more DLNA can be considered as a good candidate for sharing protected contents among authorized devices. There is a important penetration of DLNA certified devices, and it offers link protection. We identify problems on DLNA's link protection, DTCP-IP, and we propose to improve the authentication and key derivation mechanism. DLNA sharing can be extended to include pre and post acquisition protection content at the price of inexpensive descrambler.
2010 Digest of Technical Papers International Conference on Consumer Electronics (ICCE), 2010
Social networks help us to follow friends and family daily lives. Home devices are rich in user&a... more Social networks help us to follow friends and family daily lives. Home devices are rich in user's information so they are appropriate platforms to deploy social network applications. This article addresses two main requirements: content must be adapted to different devices and user's privacy must be respected. To enable social network interaction in home environments and to overcome privacy problems
Gastroenterología y Hepatología, 2009
Proceedings of the Eighth Euromicro Workshop on Real-Time Systems, 1996
Page 1. A Formal Method for Specification and Refinement of Rea Systems Peter T. Breuer, Nativida... more Page 1. A Formal Method for Specification and Refinement of Rea Systems Peter T. Breuer, Natividad Martinez Madrid Luis Sbnchez, Andres Marin and Carlos Delgado Kloos Departamento de Ingenieria de Sistemas Telemiiticos ...
2011 IEEE International Conference on Consumer Electronics (ICCE), 2011
... This article describes a solution to delegate IPTV rights to any STB using an inexpensive pie... more ... This article describes a solution to delegate IPTV rights to any STB using an inexpensive piece of hardware and the OAuth protocol. ... II. BASIS OF DELEGATION In this section we introduce the delegation paradigm, the name of the entities involved and the OAuth protocol. ...
Sleep Science, 2014
Sleep medicine in general and psychology in particular have recently developed cognitive behavior... more Sleep medicine in general and psychology in particular have recently developed cognitive behavioral treatment for narcolepsy (CBT-N). Despite a growing interest in this topic, most studies since 2007 have reviewed CBT applications for other sleep disorders. Currently, 6 reviews have been published on narcolepsy, with an expert consensus being reached that CBT represented an important adjunctive treatment for the disease. The current paper reviews the need for CBT applications for narcolepsy by generalizing the application of multicomponent treatments and performing studies that extrapolate the results obtained from multicenter studies. Nineteen studies were found in which the need-for-treatment guidelines identified the use of CBT for narcolepsy. Three additional studies were identified that evaluated the effectiveness of cognitive behavioral measures and multicomponent treatments for which treatment protocols have been proposed.
2011 4th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2011), 2011
The increasing popularity of broadband Internet and the widespread penetration of full-featured m... more The increasing popularity of broadband Internet and the widespread penetration of full-featured mobile devices have signaled WiMAX importance. IEEE 802.16 standard has focused on security from the beginning, being security support a fundamental aspect in wireless communication. We have found some limitations concerning authentication and authorization mechanisms at user level. To overcome those limitations we consider necessary to provide a proper identity management support for WiMAX for enhancing users' experience whereas delivering services in a secure fashion. In this article we analyze several weaknesses and vulnerabilities in WiMAX security and propose the introduction of identity management in WiMAX for a better provision of secure personalized services.
2012 IEEE Second International Conference on Consumer Electronics - Berlin (ICCE-Berlin), 2012
ABSTRACT Privacy rules imposed by social networks (SNs) impose several restrictions to user priva... more ABSTRACT Privacy rules imposed by social networks (SNs) impose several restrictions to user privacy. Though they usually offer the user some control to limit access to his own data, the social network may share uploaded data with other partners and marketing companies. Pictures and videos may have a second life, even after being deleted by the user, and consequently storage and access must take place in the user home domain or facilities managed by the user, following an end to end approach. We propose to combine the usage of private clouds, specialized in media contents, in cooperation with SNs, offering the user complete control over his data, while benefiting from the SNs visibility to announce and spread the data. To achieve transparency, we propose a plug-in system to embed links as annotations in reduced media replacement uploaded in the SN. These links point to the real resource stored in the private cloud, now under complete user control. We perform validation tests which show important improvements in uploading time and user experience.
Aquatic Conservation: Marine and Freshwater Ecosystems, 2015
1. Bottom-up participatory processes to create and manage no-take marine protected areas have bee... more 1. Bottom-up participatory processes to create and manage no-take marine protected areas have been proposed as a way to scale-up marine conservation and deal with the lack of support and compliance of top-down conservation approaches. However, bottom-up conservation does not always lead to positive outcomes, thus it is increasingly important to understand the conditions that determine the establishment and implementation of these initiatives. 2. Establishment and implementation processes were compared empirically for two contrasting bottom-up no-take marine protected areas that have been developing under the same political setting, however, one has been successful and the other has stalled. 3. Using mixed methods, stakeholders’ (a) motivations to participate in the no-take marine protected area initiatives, (b) communication, support and information flow networks, (c) perceived participation, and (d) satisfaction with the establishment process of the bottom-up no-take marine protected areas, were assessed. 4. Non-significant differences were found between the two initiatives in terms of stakeholders’ motivations to create a no-take marine protected area. 5. Significant differences were found in stakeholders’ communication, support and information flow networks, in addition to differences in participation, and satisfaction with the establishment and implementation process. 6. Results highlight that for the implementation and consolidation of bottom-up no-take marine protected areas initiatives, common interests do not necessarily lead to common action, partnerships will not emerge automatically in response to potential benefits. 7. Understanding disparities in participation, information sharing and communication are key aspects which must be considered for creating and supporting successful marine protected areas based on bottom-up participatory processes.
Revista Española de Enfermedades Digestivas, 2008
Cirugía Española (English Edition), 2015
ABSTRACT
Proceedings of ASP-DAC'95/CHDL'95/VLSI'95 with EDA Technofair, 1995
Here you can sign in to your guest, member or subscriber accounts. ... Cookies must be enabled to... more Here you can sign in to your guest, member or subscriber accounts. ... Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options. ... Grass, W.; Grobe, C.; Lenk, S.; Tiedemann, W.-D.; Kloos, CD; Marin, A.; ...
Cultura - Hombre - Sociedad CUHSO, 2012
2010 IEEE International Conference on Consumer Electronics (ICCE 2010), 2010
DLNA can be considered as a good candidate for sharing protected contents among authorized device... more DLNA can be considered as a good candidate for sharing protected contents among authorized devices. There is a important penetration of DLNA certified devices, and it offers link protection. We identify problems on DLNA's link protection, DTCP-IP, and we propose to improve the authentication and key derivation mechanism. DLNA sharing can be extended to include pre and post acquisition protection content at the price of inexpensive descrambler.
2010 Digest of Technical Papers International Conference on Consumer Electronics (ICCE), 2010
Social networks help us to follow friends and family daily lives. Home devices are rich in user&a... more Social networks help us to follow friends and family daily lives. Home devices are rich in user's information so they are appropriate platforms to deploy social network applications. This article addresses two main requirements: content must be adapted to different devices and user's privacy must be respected. To enable social network interaction in home environments and to overcome privacy problems
Gastroenterología y Hepatología, 2009
Proceedings of the Eighth Euromicro Workshop on Real-Time Systems, 1996
Page 1. A Formal Method for Specification and Refinement of Rea Systems Peter T. Breuer, Nativida... more Page 1. A Formal Method for Specification and Refinement of Rea Systems Peter T. Breuer, Natividad Martinez Madrid Luis Sbnchez, Andres Marin and Carlos Delgado Kloos Departamento de Ingenieria de Sistemas Telemiiticos ...
2011 IEEE International Conference on Consumer Electronics (ICCE), 2011
... This article describes a solution to delegate IPTV rights to any STB using an inexpensive pie... more ... This article describes a solution to delegate IPTV rights to any STB using an inexpensive piece of hardware and the OAuth protocol. ... II. BASIS OF DELEGATION In this section we introduce the delegation paradigm, the name of the entities involved and the OAuth protocol. ...
Sleep Science, 2014
Sleep medicine in general and psychology in particular have recently developed cognitive behavior... more Sleep medicine in general and psychology in particular have recently developed cognitive behavioral treatment for narcolepsy (CBT-N). Despite a growing interest in this topic, most studies since 2007 have reviewed CBT applications for other sleep disorders. Currently, 6 reviews have been published on narcolepsy, with an expert consensus being reached that CBT represented an important adjunctive treatment for the disease. The current paper reviews the need for CBT applications for narcolepsy by generalizing the application of multicomponent treatments and performing studies that extrapolate the results obtained from multicenter studies. Nineteen studies were found in which the need-for-treatment guidelines identified the use of CBT for narcolepsy. Three additional studies were identified that evaluated the effectiveness of cognitive behavioral measures and multicomponent treatments for which treatment protocols have been proposed.
2011 4th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2011), 2011
The increasing popularity of broadband Internet and the widespread penetration of full-featured m... more The increasing popularity of broadband Internet and the widespread penetration of full-featured mobile devices have signaled WiMAX importance. IEEE 802.16 standard has focused on security from the beginning, being security support a fundamental aspect in wireless communication. We have found some limitations concerning authentication and authorization mechanisms at user level. To overcome those limitations we consider necessary to provide a proper identity management support for WiMAX for enhancing users' experience whereas delivering services in a secure fashion. In this article we analyze several weaknesses and vulnerabilities in WiMAX security and propose the introduction of identity management in WiMAX for a better provision of secure personalized services.
2012 IEEE Second International Conference on Consumer Electronics - Berlin (ICCE-Berlin), 2012
ABSTRACT Privacy rules imposed by social networks (SNs) impose several restrictions to user priva... more ABSTRACT Privacy rules imposed by social networks (SNs) impose several restrictions to user privacy. Though they usually offer the user some control to limit access to his own data, the social network may share uploaded data with other partners and marketing companies. Pictures and videos may have a second life, even after being deleted by the user, and consequently storage and access must take place in the user home domain or facilities managed by the user, following an end to end approach. We propose to combine the usage of private clouds, specialized in media contents, in cooperation with SNs, offering the user complete control over his data, while benefiting from the SNs visibility to announce and spread the data. To achieve transparency, we propose a plug-in system to embed links as annotations in reduced media replacement uploaded in the SN. These links point to the real resource stored in the private cloud, now under complete user control. We perform validation tests which show important improvements in uploading time and user experience.