• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1017
  • 224
  • 97
  • 96
  • 70
  • 31
  • 29
  • 19
  • 19
  • 14
  • 12
  • 8
  • 7
  • 7
  • 7
  • Tagged with
  • 2079
  • 745
  • 706
  • 585
  • 437
  • 357
  • 330
  • 310
  • 227
  • 221
  • 193
  • 189
  • 174
  • 165
  • 160
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Factors Influencing Error Recovery in Collections Databases: A Museum Case Study

Marty, Paul F. January 2005 (has links)
This article offers an analysis of the process of error recovery as observed in the development and use of collections databases in a university museum. It presents results from a longitudinal case study of the development of collaborative systems and practices designed to reduce the number of errors found in the museumâ s databases as museum employees packed and moved their collections over a period of five years. Drawing upon a specific set of eighteen months worth of records documenting error rates and error management techniques, this article identifies three factors that influenced the ability of museum staff members to recover from errors found in their collections databases. The article concludes by examining the potential impact of these factors on the design of future collections databases in order to shed light on the wider issue of error recovery procedures in all information organizations.
62

PubMed Basics

National Network of Libraries of Medicine (NN/LM), U.S. January 2003 (has links)
This tri-fold brochure can be freely reproduced.
63

WINISIS - A Practical Guide: In Hindi Language

Chauhan, Buddhi P, Kapoor, Rachna, Singh, Shivendra, Das, Anup Kumar January 2007 (has links)
This WINISIS Training Manual in Hindi language contains three self-learning modules: WINISIS â A Practical Guide; Creating Web Interface for CDS/ISIS Databases using GenisisWeb; and Publishing CDS/ISIS Databases on CD-ROM using GenisisCD. These self-learning modules are the outcome of the Advanced Workshop on CDS-ISIS for Windows, held at the Thapar University on 14-18 May 2007. The Training Manual covers all aspects of WINISIS: installation of software, creation of the database, database operations, customization of search interfaces and display formatting language. Advanced features, such as hyper-linking, web interfacing, full-text document processing and automation of libraries, are also present in this document. Target audience of this Manual is library professionals working in academic, special and public libraries as well as students of library science courses. The Manual will also be helpful to small organizations, which are building digital archives in local library setup or on CD-ROMs. After practicing the laboratory exercises given in the Manual, the learners will be able to install WINISIS software and its web application tools GENISIS; create and manage bibliographic or full-text databases. This Manual is particularly useful in the South Asian region, where availability of training material in local languages is crucial for providing public information services with the help of free and open source software (FOSS).
64

Publishing a CDS/ISIS Database in GSDL

Singh, Sukhdev January 2002 (has links)
Gives step by step instructions to Publish a ISIS (WINISIS or CDS/ISIS) database in Greenstone Digital Library software. The core of the methodology is to 1) print entire database to a file; 2) chop the file to get single html file per record; 3) use of HTML META tags to generate metadata and 4) Creating a digital library by using Greenstone Digital Library Software(GSDL). The GSDL can be used for providing access to this collection by server or from CDROM.
65

An Issues Identifier for Online Financial Databases

Yen, J., Chen, Hsinchun, Ma, P., Bui, T. January 1995 (has links)
Artificial Intelligence Lab, Department of MIS, University of Arizona / A major problem that decision makers are facing in an information-rich society is how to absorb, filter and make effective use of available data. The problem caused by information overflow could lead to the losses of competitiveness. This paper presents a knowledge-based approach to building an issues identifier to help investors overcome information overflow problems when dealing with very large on-line financial databases. The proposed software system is able to extract critical issues from the on-line financial databases. The system was developed based on a number of techniques: automatic indexing, concept space genemtion, and neural network classification. In this paper, we describe how these techniques are used to extract subject descriptors, their semantic relationships, and the related texts (documents or paragraphs) to each descriptor. The proposed system has been tested with the annual reports from thirteen of the largest international banks.
66

Google Scholar and 100% Availability of Information. Information Technology and Libraries, 25(1), 52-56

Pomerantz, Jeffrey 06 1900 (has links)
This paper discusses Google Scholar as an extension of Kilgourâ s goal to improve the availability of information. Kilgour was instrumental in the early development of the online library catalog, and he proposed passage retrieval to aid in information seeking. Google Scholar is a direct descendent of these technologies foreseen by Kilgour. Google Scholar holds promise as a means for libraries to expand their reach to new user communities, and to enable libraries to provide quality resources to users during their online search process.
67

A Methodology for Managing Roles in Legacy Systems

January 2003 (has links)
Role-based access control (RBAC) is well accepted as a good technology for managing and designing access control in systems with many users and many objects. Much of the research on RBAC has been done in an environment isolated from real systems which need to be managed. In this paper, we propose a methodology for using an RBAC design tool we have developed, to manage and effect changes to an underlying relational database. We also discuss how to simulate the role graph model on a Unix system, and extend the methodology just described for relational databases to managing a Unix system when changes are made to the role graph.
68

Publishing a CDS/ISIS Database in GSDL(Revised/Corrected Version.

Singh, Sukhdev January 2002 (has links)
Gives step by step instructions to Publish a ISIS (WINISIS or CDS/ISIS) database in Greenstone Digital Library software. The core of the methodology is to 1) print entire database to a file; 2) chop the file to get single html file per record; 3) use of HTML META tags to generate metadata and 4) Creating a digital library by using Greenstone Digital Library Software(GSDL). The GSDL can be used for providing access to this collection by server or from CDROM.
69

Integrating databases and publish/subscribe

Vargas Herring, Luis Carlos January 2010 (has links)
No description available.
70

Implementation and applications of recursively defined relations

Clouâtre, André January 1987 (has links)
In relational algebra, a recursive relation R is defined by an equation of the form R = f(R), where f(R) is a positive relational algebra expression. Such an equation can be solved by applying a general closure operator. Although some optimization is possible, the performance obtained using this approach is very dependent on the form of the equation which defines R. Principally for this reason, we have developed specialized closure operators for relations which are solutions to problems of practical importance such as transitive closure, accessibility, shortest path, bill-of-materials, and deductions by containment comparisons. / This approach has led to the following general results: (1) design, classification, and analysis of many iterative methods for evaluating recursive relations, as well as analysis of experimental results; (2) formalization of the concept of iterative evaluation of a relation; (3) demonstration that domain algebra can be used to solve problems of concatenation and aggregation of the information associated with a recursive structure; (4) proof that relational division and general containment joins are left-monotone. / More specific results consist of a collection of original algorithms which run well on secondary storage, as shown by simulations. Among them, we wish to emphasize the differencing logarithmic transitive closure (TC) algorithms, which are superior to the previously known relational TC algorithms, and the shortest path algorithms, which are in fact generic algorithms for path algebra problems.

Page generated in 0.053 seconds