doi:10.1136/tc.2008.025445 2008;17;313-323; originally published online 25 Sep 2008; Tob. Control K L Lum, J R Polansky, R K Jackler and S A Glantz Hollywood, 19271951 Signed, sealed and delivered: "big tobacco" in http://tobaccocontrol.bmj.com/cgi/content/full/17/5/313 Updated information and services can be found at: These include: References http://tobaccocontrol.bmj.com/cgi/content/full/17/5/313#BIBL This article cites 11 articles, 2 of which can be accessed free at: Open Access This article is free to access Rapid responses http://tobaccocontrol.bmj.com/cgi/eletter-submit/17/5/313 You can respond to this article at: service Email alerting the top right corner of the article Receive free email alerts when new articles cite this article - sign up in the box at Topic collections (15 articles) Tobacco use (6 articles) Economics of tobacco use and control (3 articles) Tobacco use (youth) (85 articles) Smoking Articles on similar topics can be found in the following collections Notes http://journals.bmj.com/cgi/reprintform To order reprints of this article go to: http://journals.bmj.com/subscriptions/ go to: Tobacco ControlTo subscribe to on 25 September 2008 tobaccocontrol.bmj.comDownloaded from Signed, sealed and delivered: ‘‘big tobacco’’ in Hollywood, 1927–1951 K L Lum, 1 J R Polansky, 2 R K Jackler, 3 S A Glantz 4 1 Center for Tobacco Control Research and Education, University of California, San Francisco, California, USA; 2 Onbeyond LLC, Fairfax, California, USA; 3 Department of Otolaryngology – Head & Neck Surgery, Stanford University School of Medicine, Stanford, California, USA; 4 Center for Tobacco Control Research and Education and Department of Medicine, University of California, San Francisco, California, USA Correspondence to: S A Glantz, Center for Tobacco Control Research and Education and Department of Medicine, University of California, 530 Parnassus Ave #366, San Francisco, California, 94143- 1390, USA; glantz@medicine. ucsf.edu Received 14 March 2008 Accepted 18 July 2008 This paper is freely available online under the BMJ Journals unlocked scheme, see http:// tobaccocontrol.bmj.com/info/ unlocked.dtl ABSTRACT Objective: Smoking in movies is associated with adolescent and young adult smoking initiation. Public health efforts to eliminate smoking from films accessible to youth have been countered by defenders of the status quo, who associate tobacco imagery in ‘‘classic’’ movies with artistry and nostalgia. The present work explores the mutually beneficial commercial collaborations between the tobacco companies and major motion picture studios from the late 1920s through the 1940s. Methods: Cigarette endorsement contracts with Hollywood stars and movie studios were obtained from internal tobacco industry documents at the University of California, San Francisco (UCSF) Legacy Tobacco Documents Library and the Jackler advertising collection at Stanford. Results: Cigarette advertising campaigns that included Hollywood endorsements appeared from 1927 to 1951, with major activity in 1931–2 and 1937–8 for American Tobacco Company’s Lucky Strike, and in the late 1940s for Liggett & Myers’ Chesterfield. Endorsement contracts and communication between American Tobacco and movie stars and studios explicitly reveal the cross- promotional value of the campaigns. American Tobacco paid movie stars who endorsed Lucky Strike cigarettes US$218 750 in 1937–8 (equivalent to US$3.2 million in 2008) for their testimonials. Conclusions: Hollywood endorsements in cigarette advertising afforded motion picture studios nationwide publicity supported by the tobacco industry’s multimillion US dollar advertising budgets. Cross-promotion was the incentive that led to a signed by Công Công Ty Cổ Digitally Ty Cổ Phần Cảng Dịch Vụ Khí Tổng Hợp PTSC Phần Cảng Dầu Thanh Hóa cn=Công Ty Cổ Phần Dịch Vụ Dầu DN: Cảng Dịch Vụ Dầu Khí Hợp PTSC Thanh Khí Tổng Hợp Tổng Hóa, c=VN, l=Tĩnh Gia, PTSC Thanh st=Thanh Hóa Date: 2017.09.27 16:54:37 +07'00' Hóa Hindawi Publishing Corporation EURASIP Journal on Image and Video Processing Volume 2007, Article ID 54679, 7 pages doi:10.1155/2007/54679 Research Article Adaptation of Zerotrees Using Signed Binary Digit Representations for 3D Image Coding Emmanuel Christophe, 1, 2 Pierre Duhamel, 3 and Corinne Mailhes 2 1 CNES, BPI 1219, 18 avenue Edourad Belin, 31401 Toulouse cedex 9, France 2 TeSA / IRIT, 14 port St Etienne, 31000 Toulouse, France 3 CNRS / LSS, Supelec Plateau de Moulon, 91192 Gif-sur-Yvette, France Received 15 August 2006; Revised 16 December 2006; Accepted 18 December 2006 Recommended by James E. Fowler Zerotrees of wavelet coefficients have shown a good adaptability for the compression of three-dimensional images. EZW, the original algorithm using zerotree, shows good performance and was successfully adapted to 3D image compression. This paper focuses on the adaptation of EZW for the compression of hyperspectral images. The subordinate pass is suppressed to remove the necessity to keep the significant pixels in memory. To compensate the loss due to this removal, signed binary digit representations are used to increase the efficiency of zerotrees. Contextual arithmetic coding with very limited contexts is also used. Finally, we show that this simplified version of 3D-EZW performs almost as well as the original one. Copyright © 2007 Emmanuel Christophe et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. 1. INTRODUCTION Since the publication of the Grossmann and Morlet paper [1], theory and applications concerning wavelets have im- proved. Theory on wavelets was progressively refined in sev- eral papers (e.g., [2, 3]). Originally, applications concerned mostly the data analysis field and more precisely in the time- scale analysis. However, their efficiency to represent complex signals with a limited number of generating func tions raised an interest for image coding [4]. Research in wavelet-based image coding began focusing on the search for the most efficient wavelet form to represent the data as in [4] together with the most efficient decompo- sition [5]. The quasiorthogonal 9/7 wavelet for lossy com- pression and the 5/3 wavelet for lossless compression with a multiresolution decomposition exhibit good results for a wide range of natural images. Thus, these specifications were adopted in the latest still image compression standard: JPEG 2000 [6]. Efficient techniques to code these wavelet coefficients were then defined. EZW successfully made use of the relation of wavelet coefficients in zerotrees [7], a technique which was further refined with SPIHT [8]. EBCOT, the coder for JPEG 2000 focuses on the neighborhood of each coefficient using contextual arithmetic coding [9]. In this standard, a total of 18 different contexts are used according to the value of neigh- boring coefficients. This paper looks at the zerotree-based compression tech- niques and improves them with the use of signed binary rep- resentations and arithmetic coding particularly in the con- text of 3D image encoding. The 3D images used here are hyperspectral images from the JPL/NASA airborne sensor AVIRIS. The same methods can be applied to medical images as magnetic resonance (MR) or computed tomography (CT) which are also formed of several slices. Hyperspectral image involves observing the same scene at different wavelengths (Figure 1). Typically, each image pixel is represented Advances in Security and Payment Methods for Mobile Commerce Wen-Chen Hu University of North Dakota, USA Chung-wei Lee Auburn University, USA Weidong Kou Chinese State Key Lab. of Integrated Service Networks, China Hershey • London • Melbourne • Singapore IDEA GROUP PUBLISHING TeAM YYePG Digitally signed by TeAM YYePG DN: cn=TeAM YYePG, c=US, o=TeAM YYePG, ou=TeAM YYePG, email=yyepg@msn.com Reason: I attest to the accuracy and integrity of this document Date: 2005.02.23 04:49:12 +08'00' Acquisitions Editor: Mehdi Khosrow-Pour Senior Managing Editor: Jan Travers Managing Editor: Amanda Appicello Development Editor: Michele Rossi Copy Editor: Ingrid Widitz Typesetter: Jennifer Wetzel Cover Design: Lisa Tosheff Printed at: Yurchak Printing Inc. Published in the United States of America by Idea Group Publishing (an imprint of Idea Group Inc.) 701 E. Chocolate Avenue, Suite 200 Hershey PA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: cust@idea-group.com Web site: http://www.idea-group.com and in the United Kingdom by Idea Group Publishing (an imprint of Idea Group Inc.) 3 Henrietta Street Covent Garden London WC2E 8LU Tel: 44 20 7240 0856 Fax: 44 20 7379 3313 Web site: http://www.eurospan.co.uk Copyright © 2005 by Idea Group Inc. All rights reserved. No part of this book may be repro- duced in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher. Library of Congress Cataloging-in-Publication Data Advances in security and payment methods for mobile commerce / Wen Chen Hu, Chung-Wei Lee and Weidong Kou, editors. p. cm. Includes bibliographical references and index. ISBN 1-59140-345-6 (h/c) ISBN 1-59140-346-4 (s/c) ISBN 1-59140-347-2 (eisbn) 1. Mobile commerce Security measures. 2. Business enterprises Computer networks Security measures. I. Hu, Wen Chen, 1960- II. Lee, Chung-Wei, 1965- III. Kou, Weidong. HF5548.34.A37 2004 658.4'78 dc22 2004016285 British Cataloguing in Publication Data A Cataloguing in Publication record for this book is available from the British Library. All work contributed to this book is new, previously-unpublished material. The views expressed in this book are those of the authors, but not necessarily of the publisher. Advances in Security and Payment Methods for Mobile Commerce Table of Contents Preface vi Section I: Fundamentals of Mobile Commerce Security and Payment Methods Chapter I Mobile Commerce Security and Payment Methods 1 Chung-wei Lee, Auburn University, USA Weidong Kou, Chinese State Key Lab. of Integrated Service Networks, China Wen-Chen Hu, University of North Dakota, USA Chapter II Reputation and Trust 19 Li Xiong, Georgia Institute of Technology, USA Ling Liu, Georgia Institute of Technology, USA Chapter III Intrusion Detection and Vulnerability Analysis of Mobile Commerce Platform 36 Changhua Zhu, Xidian University, China Changxing Pei, Xidian University, China Chapter IV A Secure Authentication Infrastructure for Mobile Users 56 Gregor v. Bochmann, University of Ottawa, Canada Eric Zhen Zhang, University of Ottawa, Canada Section II: Mobile Commerce Security Chapter V Policy-Based Access Control for Context-Aware Services over the Wireless Internet 81 Paolo Bellavista, University of Bologna, Italy Antonio Corradi, University of Bologna, Italy Cesare Stefanelli, University of Ferrara, Italy Chapter VI A Comprehensive XML Based Approach to Trust Negotiations 109 Elisa Bertino, Purdue University, USA Elena Ferrari, Università degli Studi dell’Insubria, Italy Anna Cinzia Squicciarini, Università degli Studi di Milano, Italy Chapter VII Security Issues and Possible Countermeasures for a Mobile Agent Based M-Commerce Application 140 Jyh-haw Yeh, Boise State University, USA Wen-Chen Hu, University of North Dakota, USA Chung-wei Lee, Auburn University, USA Chapter VIII Secure Multicast for Mobile Commerce Applications: Issues and Challenges 164 Mohamed Eltoweissy, Virginia Tech, USA Sushil Jajodia, George A Mathematical Bibliography of Signed and Gain Graphs and Allied Areas Compiled by Thomas Zaslavsky Manuscript prepared with Marge Pratt Department of Mathematical Sciences Binghamton University Binghamton, New York, U.S.A. 13902-6000 E-mail: zaslav@math.binghamton.edu Submitted: March 19, 1998; Accepted: July 20, 1998. Seventh Edition 1999 September 22 Mathematics Subject Classifications (2000): Primary 05-00, 05-02, 05C22; Secondary 05B20, 05B35, 05C07, 05C10, 05C15, 05C17, 05C20, 05C25, 05C30, 05C35, 05C38, 05C40, 05C45, 05C50, 05C60, 05C62, 05C65, 05C70, 05C75, 05C80, 05C83, 05C85, 05C90, 05C99, 05E25, 05E30, 06A07, 15A06, 15A15, 15A39, 15A99, 20B25, 20F55, 34C99, 51D20, 51D35, 51E20, 51M09, 52B12, 52C07, 52C35, 57M27, 68Q15, 68Q25, 68R10, 82B20, 82D30, 90B10, 90C08, 90C27, 90C35, 90C57, 90C60, 91B14, 91C20, 91D30, 91E10, 92D40, 92E10, 94B75. Colleagues: HELP! If you have any suggestions whatever for items to include in this bibliography, or for other changes, please let me hear from you. Thank you. Copyright c 1996, 1998, 1999 Thomas Zaslavsky Typeset by A M S-T E X i Index A1 B8 C23 D34 E40 F44 G58 H59 I71 J72 K75 L84 M90 N99 O 101 P 102 Q 109 R 109 S 113 T 126 U 133 V 133 W 135 X 139 Y 139 Z 140 Preface A signed graph is a graph whose edges are labeled by signs. This is a bibliography of signed graphs and related mathematics. Several kinds of labelled graph have been called “signed” yet are mathematically very different. I distinguish four types: • Group-signed graphs: the edge labels are elements of a 2-element group and are mul- tiplied around a polygon (or along any walk). Among the natural generalizations are larger groups and vertex signs. • Sign-colored graphs, in which the edges are labelled from a two-element set that is acted upon by the sign group: − interchanges labels, + leaves them unchanged. This is the kind of “signed graph” found in knot theory. The natural generalization is to more colors and more general groups—or no group. • Weighted graphs,inwhichtheedgelabelsaretheelements+1and−1oftheintegers or another additive domain. Weights behave like numbers, not signs; thus I regard work on weighted graphs as outside the scope of the bibliography—except (to some extent) when the author calls the weights “signs”. • Labelled graphs where the labels have no structure or properties but are called “signs” for any or no reason. Each of these categories has its own theory or theories, generally very different from the others, so in a logical sense the topic of this bibliography is an accident of terminology. However, narrow logic here leads us astray, for the study of true signed graphs, which arise in numerous areas of pure and applied mathematics, forms the great majority of the literature. Thus I regard as fundamental for the bibliography the notions of balance of a polygon (sign product equals +, the sign group identity) and the vertex-edge incidence matrix (whose column for a negative edge has two +1’s or two −1’s, for a positive edge one +1 and one −1, the rest being zero); this has led me to include work on gain graphs (where the edge labels are taken from any group) and “consistency” in vertex-signed graphs,and generalizable work on two-graphs (the set of unbalanced triangles of a signed complete graph) and on even and odd polygons and paths in graphs and digraphs. Nevertheless, it was not always easy to decide what belongs. I have employed the following principles: Only works with mathematical content are entered, except for a few representative purely applied papers and surveys. I do try to include: • Any (mathematical) work in which signed graphs are mentioned by name or signs are put on the edges of graphs, regardless of whether it makes essential use of signs. (However, due to lack of time and in order to maintain “balance” in the bibliography, I have included only a limited selection of items concerning binary clutters and postman theory, two-graphs, signed digraphs in qualitative matrix theory, and knot