Andres Reyes Marin | I.U Colegio Mayor de Antioquia (original) (raw)

Uploads

Papers by Andres Reyes Marin

Research paper thumbnail of Trastornos del sueño, salud y calidad de vida: Una perspectiva desde la medicina comportamental del sueño

Research paper thumbnail of Establishing marine protected areas through bottom-up processes: insights from two contrasting initiatives in Chile

Aquatic Conservation: Marine and Freshwater Ecosystems, 2015

1. Bottom-up participatory processes to create and manage no-take marine protected areas have bee... more 1. Bottom-up participatory processes to create and manage no-take marine protected areas have been proposed as a way to scale-up marine conservation and deal with the lack of support and compliance of top-down conservation approaches. However, bottom-up conservation does not always lead to positive outcomes, thus it is increasingly important to understand the conditions that determine the establishment and implementation of these initiatives. 2. Establishment and implementation processes were compared empirically for two contrasting bottom-up no-take marine protected areas that have been developing under the same political setting, however, one has been successful and the other has stalled. 3. Using mixed methods, stakeholders’ (a) motivations to participate in the no-take marine protected area initiatives, (b) communication, support and information flow networks, (c) perceived participation, and (d) satisfaction with the establishment process of the bottom-up no-take marine protected areas, were assessed. 4. Non-significant differences were found between the two initiatives in terms of stakeholders’ motivations to create a no-take marine protected area. 5. Significant differences were found in stakeholders’ communication, support and information flow networks, in addition to differences in participation, and satisfaction with the establishment and implementation process. 6. Results highlight that for the implementation and consolidation of bottom-up no-take marine protected areas initiatives, common interests do not necessarily lead to common action, partnerships will not emerge automatically in response to potential benefits. 7. Understanding disparities in participation, information sharing and communication are key aspects which must be considered for creating and supporting successful marine protected areas based on bottom-up participatory processes.

Research paper thumbnail of Hemorragia invalidante y recidivante por angiodisplasia intestinal: tratamiento con talidomida

Revista Española de Enfermedades Digestivas, 2008

Research paper thumbnail of Predictive Factors for Mortality in Fournier's Gangrene: A Series of 59 Cases

Cirugía Española (English Edition), 2015

ABSTRACT

Research paper thumbnail of Factores predictivos de mortalidad en la gangrena de Fournier: serie de 59 casos

Research paper thumbnail of Transformation of timing diagram specifications into VHDL code

Proceedings of ASP-DAC'95/CHDL'95/VLSI'95 with EDA Technofair, 1995

Here you can sign in to your guest, member or subscriber accounts. ... Cookies must be enabled to... more Here you can sign in to your guest, member or subscriber accounts. ... Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options. ... Grass, W.; Grobe, C.; Lenk, S.; Tiedemann, W.-D.; Kloos, CD; Marin, A.; ...

Research paper thumbnail of Gobernanza y capital social en el comanejo de recursos bentónicos en Chile: aportes del análisis de redes al estudio de la pesca artesanal de pequeña escala

Cultura - Hombre - Sociedad CUHSO, 2012

Research paper thumbnail of Extended DLNA protocol: sharing protected pay TV contents

2010 IEEE International Conference on Consumer Electronics (ICCE 2010), 2010

DLNA can be considered as a good candidate for sharing protected contents among authorized device... more DLNA can be considered as a good candidate for sharing protected contents among authorized devices. There is a important penetration of DLNA certified devices, and it offers link protection. We identify problems on DLNA's link protection, DTCP-IP, and we propose to improve the authentication and key derivation mechanism. DLNA sharing can be extended to include pre and post acquisition protection content at the price of inexpensive descrambler.

Research paper thumbnail of ¿Cuál es la técnica quirúrgica de elección en un paciente obeso con hernia hiatal paraesofágica?

Research paper thumbnail of Socializing electronics: Secure interactions in social networks

2010 Digest of Technical Papers International Conference on Consumer Electronics (ICCE), 2010

Social networks help us to follow friends and family daily lives. Home devices are rich in user&a... more Social networks help us to follow friends and family daily lives. Home devices are rich in user's information so they are appropriate platforms to deploy social network applications. This article addresses two main requirements: content must be adapted to different devices and user's privacy must be respected. To enable social network interaction in home environments and to overcome privacy problems

Research paper thumbnail of Eficiencia y seguridad del tratamiento ambulatorio de la diverticulitis aguda

Gastroenterología y Hepatología, 2009

Research paper thumbnail of A formal method for specification and refinement of real-time systems

Proceedings of the Eighth Euromicro Workshop on Real-Time Systems, 1996

Page 1. A Formal Method for Specification and Refinement of Rea Systems Peter T. Breuer, Nativida... more Page 1. A Formal Method for Specification and Refinement of Rea Systems Peter T. Breuer, Natividad Martinez Madrid Luis Sbnchez, Andres Marin and Carlos Delgado Kloos Departamento de Ingenieria de Sistemas Telemiiticos ...

Research paper thumbnail of FLASS, A new awakening: For the dissemination of clinical and basic sleep science in Latin America

Research paper thumbnail of Glucagonoma pancreático no funcionante

Research paper thumbnail of IPTV meets delegation: Achieving IPTV service portability

2011 IEEE International Conference on Consumer Electronics (ICCE), 2011

... This article describes a solution to delegate IPTV rights to any STB using an inexpensive pie... more ... This article describes a solution to delegate IPTV rights to any STB using an inexpensive piece of hardware and the OAuth protocol. ... II. BASIS OF DELEGATION In this section we introduce the delegation paradigm, the name of the entities involved and the OAuth protocol. ...

Research paper thumbnail of Schwannoma quístico cervical del nervio vago

Research paper thumbnail of Cognitive behavioral treatment for narcolepsy: can it complement pharmacotherapy?

Sleep Science, 2014

Sleep medicine in general and psychology in particular have recently developed cognitive behavior... more Sleep medicine in general and psychology in particular have recently developed cognitive behavioral treatment for narcolepsy (CBT-N). Despite a growing interest in this topic, most studies since 2007 have reviewed CBT applications for other sleep disorders. Currently, 6 reviews have been published on narcolepsy, with an expert consensus being reached that CBT represented an important adjunctive treatment for the disease. The current paper reviews the need for CBT applications for narcolepsy by generalizing the application of multicomponent treatments and performing studies that extrapolate the results obtained from multicenter studies. Nineteen studies were found in which the need-for-treatment guidelines identified the use of CBT for narcolepsy. Three additional studies were identified that evaluated the effectiveness of cognitive behavioral measures and multicomponent treatments for which treatment protocols have been proposed.

Research paper thumbnail of Introducing identity management in WiMAX to enable secure and personalized services

2011 4th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2011), 2011

The increasing popularity of broadband Internet and the widespread penetration of full-featured m... more The increasing popularity of broadband Internet and the widespread penetration of full-featured mobile devices have signaled WiMAX importance. IEEE 802.16 standard has focused on security from the beginning, being security support a fundamental aspect in wireless communication. We have found some limitations concerning authentication and authorization mechanisms at user level. To overcome those limitations we consider necessary to provide a proper identity management support for WiMAX for enhancing users' experience whereas delivering services in a secure fashion. In this article we analyze several weaknesses and vulnerabilities in WiMAX security and propose the introduction of identity management in WiMAX for a better provision of secure personalized services.

Research paper thumbnail of Network approach for understanding small-scale fisheries governance: The case of the Chilean coastal co-management system

Research paper thumbnail of Private cloud and media privacy in social networks

2012 IEEE Second International Conference on Consumer Electronics - Berlin (ICCE-Berlin), 2012

ABSTRACT Privacy rules imposed by social networks (SNs) impose several restrictions to user priva... more ABSTRACT Privacy rules imposed by social networks (SNs) impose several restrictions to user privacy. Though they usually offer the user some control to limit access to his own data, the social network may share uploaded data with other partners and marketing companies. Pictures and videos may have a second life, even after being deleted by the user, and consequently storage and access must take place in the user home domain or facilities managed by the user, following an end to end approach. We propose to combine the usage of private clouds, specialized in media contents, in cooperation with SNs, offering the user complete control over his data, while benefiting from the SNs visibility to announce and spread the data. To achieve transparency, we propose a plug-in system to embed links as annotations in reduced media replacement uploaded in the SN. These links point to the real resource stored in the private cloud, now under complete user control. We perform validation tests which show important improvements in uploading time and user experience.

Research paper thumbnail of Trastornos del sueño, salud y calidad de vida: Una perspectiva desde la medicina comportamental del sueño

Research paper thumbnail of Establishing marine protected areas through bottom-up processes: insights from two contrasting initiatives in Chile

Aquatic Conservation: Marine and Freshwater Ecosystems, 2015

1. Bottom-up participatory processes to create and manage no-take marine protected areas have bee... more 1. Bottom-up participatory processes to create and manage no-take marine protected areas have been proposed as a way to scale-up marine conservation and deal with the lack of support and compliance of top-down conservation approaches. However, bottom-up conservation does not always lead to positive outcomes, thus it is increasingly important to understand the conditions that determine the establishment and implementation of these initiatives. 2. Establishment and implementation processes were compared empirically for two contrasting bottom-up no-take marine protected areas that have been developing under the same political setting, however, one has been successful and the other has stalled. 3. Using mixed methods, stakeholders’ (a) motivations to participate in the no-take marine protected area initiatives, (b) communication, support and information flow networks, (c) perceived participation, and (d) satisfaction with the establishment process of the bottom-up no-take marine protected areas, were assessed. 4. Non-significant differences were found between the two initiatives in terms of stakeholders’ motivations to create a no-take marine protected area. 5. Significant differences were found in stakeholders’ communication, support and information flow networks, in addition to differences in participation, and satisfaction with the establishment and implementation process. 6. Results highlight that for the implementation and consolidation of bottom-up no-take marine protected areas initiatives, common interests do not necessarily lead to common action, partnerships will not emerge automatically in response to potential benefits. 7. Understanding disparities in participation, information sharing and communication are key aspects which must be considered for creating and supporting successful marine protected areas based on bottom-up participatory processes.

Research paper thumbnail of Hemorragia invalidante y recidivante por angiodisplasia intestinal: tratamiento con talidomida

Revista Española de Enfermedades Digestivas, 2008

Research paper thumbnail of Predictive Factors for Mortality in Fournier's Gangrene: A Series of 59 Cases

Cirugía Española (English Edition), 2015

ABSTRACT

Research paper thumbnail of Factores predictivos de mortalidad en la gangrena de Fournier: serie de 59 casos

Research paper thumbnail of Transformation of timing diagram specifications into VHDL code

Proceedings of ASP-DAC'95/CHDL'95/VLSI'95 with EDA Technofair, 1995

Here you can sign in to your guest, member or subscriber accounts. ... Cookies must be enabled to... more Here you can sign in to your guest, member or subscriber accounts. ... Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options. ... Grass, W.; Grobe, C.; Lenk, S.; Tiedemann, W.-D.; Kloos, CD; Marin, A.; ...

Research paper thumbnail of Gobernanza y capital social en el comanejo de recursos bentónicos en Chile: aportes del análisis de redes al estudio de la pesca artesanal de pequeña escala

Cultura - Hombre - Sociedad CUHSO, 2012

Research paper thumbnail of Extended DLNA protocol: sharing protected pay TV contents

2010 IEEE International Conference on Consumer Electronics (ICCE 2010), 2010

DLNA can be considered as a good candidate for sharing protected contents among authorized device... more DLNA can be considered as a good candidate for sharing protected contents among authorized devices. There is a important penetration of DLNA certified devices, and it offers link protection. We identify problems on DLNA's link protection, DTCP-IP, and we propose to improve the authentication and key derivation mechanism. DLNA sharing can be extended to include pre and post acquisition protection content at the price of inexpensive descrambler.

Research paper thumbnail of ¿Cuál es la técnica quirúrgica de elección en un paciente obeso con hernia hiatal paraesofágica?

Research paper thumbnail of Socializing electronics: Secure interactions in social networks

2010 Digest of Technical Papers International Conference on Consumer Electronics (ICCE), 2010

Social networks help us to follow friends and family daily lives. Home devices are rich in user&a... more Social networks help us to follow friends and family daily lives. Home devices are rich in user's information so they are appropriate platforms to deploy social network applications. This article addresses two main requirements: content must be adapted to different devices and user's privacy must be respected. To enable social network interaction in home environments and to overcome privacy problems

Research paper thumbnail of Eficiencia y seguridad del tratamiento ambulatorio de la diverticulitis aguda

Gastroenterología y Hepatología, 2009

Research paper thumbnail of A formal method for specification and refinement of real-time systems

Proceedings of the Eighth Euromicro Workshop on Real-Time Systems, 1996

Page 1. A Formal Method for Specification and Refinement of Rea Systems Peter T. Breuer, Nativida... more Page 1. A Formal Method for Specification and Refinement of Rea Systems Peter T. Breuer, Natividad Martinez Madrid Luis Sbnchez, Andres Marin and Carlos Delgado Kloos Departamento de Ingenieria de Sistemas Telemiiticos ...

Research paper thumbnail of FLASS, A new awakening: For the dissemination of clinical and basic sleep science in Latin America

Research paper thumbnail of Glucagonoma pancreático no funcionante

Research paper thumbnail of IPTV meets delegation: Achieving IPTV service portability

2011 IEEE International Conference on Consumer Electronics (ICCE), 2011

... This article describes a solution to delegate IPTV rights to any STB using an inexpensive pie... more ... This article describes a solution to delegate IPTV rights to any STB using an inexpensive piece of hardware and the OAuth protocol. ... II. BASIS OF DELEGATION In this section we introduce the delegation paradigm, the name of the entities involved and the OAuth protocol. ...

Research paper thumbnail of Schwannoma quístico cervical del nervio vago

Research paper thumbnail of Cognitive behavioral treatment for narcolepsy: can it complement pharmacotherapy?

Sleep Science, 2014

Sleep medicine in general and psychology in particular have recently developed cognitive behavior... more Sleep medicine in general and psychology in particular have recently developed cognitive behavioral treatment for narcolepsy (CBT-N). Despite a growing interest in this topic, most studies since 2007 have reviewed CBT applications for other sleep disorders. Currently, 6 reviews have been published on narcolepsy, with an expert consensus being reached that CBT represented an important adjunctive treatment for the disease. The current paper reviews the need for CBT applications for narcolepsy by generalizing the application of multicomponent treatments and performing studies that extrapolate the results obtained from multicenter studies. Nineteen studies were found in which the need-for-treatment guidelines identified the use of CBT for narcolepsy. Three additional studies were identified that evaluated the effectiveness of cognitive behavioral measures and multicomponent treatments for which treatment protocols have been proposed.

Research paper thumbnail of Introducing identity management in WiMAX to enable secure and personalized services

2011 4th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2011), 2011

The increasing popularity of broadband Internet and the widespread penetration of full-featured m... more The increasing popularity of broadband Internet and the widespread penetration of full-featured mobile devices have signaled WiMAX importance. IEEE 802.16 standard has focused on security from the beginning, being security support a fundamental aspect in wireless communication. We have found some limitations concerning authentication and authorization mechanisms at user level. To overcome those limitations we consider necessary to provide a proper identity management support for WiMAX for enhancing users' experience whereas delivering services in a secure fashion. In this article we analyze several weaknesses and vulnerabilities in WiMAX security and propose the introduction of identity management in WiMAX for a better provision of secure personalized services.

Research paper thumbnail of Network approach for understanding small-scale fisheries governance: The case of the Chilean coastal co-management system

Research paper thumbnail of Private cloud and media privacy in social networks

2012 IEEE Second International Conference on Consumer Electronics - Berlin (ICCE-Berlin), 2012

ABSTRACT Privacy rules imposed by social networks (SNs) impose several restrictions to user priva... more ABSTRACT Privacy rules imposed by social networks (SNs) impose several restrictions to user privacy. Though they usually offer the user some control to limit access to his own data, the social network may share uploaded data with other partners and marketing companies. Pictures and videos may have a second life, even after being deleted by the user, and consequently storage and access must take place in the user home domain or facilities managed by the user, following an end to end approach. We propose to combine the usage of private clouds, specialized in media contents, in cooperation with SNs, offering the user complete control over his data, while benefiting from the SNs visibility to announce and spread the data. To achieve transparency, we propose a plug-in system to embed links as annotations in reduced media replacement uploaded in the SN. These links point to the real resource stored in the private cloud, now under complete user control. We perform validation tests which show important improvements in uploading time and user experience.