oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Improving access to information – defining core electronic resources for research and wellbeing  [cached]
Kristiina Hormia-Poutanen
Liber Quarterly : The Journal of European Research Libraries , 2007,
Abstract: Research and innovation are listed as the key success factors for the future development of Finnish prosperity and the Finnish economy. The Finnish libraries have developed a scenario to support this vision. University, polytechnic and research institute libraries as well as public libraries have defined the core electronic resources necessary to improve access to information in Finland. The primary aim of this work has been to provide information and justification for central funding for electronic resources to support the national goals. The secondary aim is to help with the reallocation of existing central funds to better support access to information.
An information system for integrated land and water resources management in the Kara River basin (Togo and Benin)  [PDF]
Hèou Maléki Badjana,Franziska Zander,Sven Kralisch,J?rg Helmschrot,Wolfgang-Albert Flügel
Computer Science , 2015, DOI: 10.5121/ijdms.2015.7102
Abstract: A prerequisite for integrated land and water resources management (ILWRM) is a holistic river basin assessment. The latter requires information and data from different scientific disciplines but also appropriate data management systems to store and manage historical and real time data, set up protocols that facilitate data and information access and sharing among different stakeholders, and triggering further collaboration among different institutions in support of watershed-based assessment, management and planning. In West Africa in general and especially in the transboundary Volta River basin where different environmental data are collected and managed by different agencies in different countries and also where data access and dissemination are very challenging and difficult tasks, comprehensive river basin information systems are required. This paper presents the Oti River Basin Information System (OtiRBIS), a web-based data storage, management andanalysis platform that addresses these needs and facilitates ILWRM implementation in the Kara river basin.
E-net models for distribution, access and use of resources in security information systems  [PDF]
Nikolai Stoianov,Veselin Tselkov
Computer Science , 2010,
Abstract: This paper presents solutions for distribution, access and use of resources in information security systems. The solutions comprise the authors' experience in development and implementation of systems for information security in the Automated Information Systems. The models, the methods and the modus operandi are being explained.
Towards Implementing an Enterprise Groupware-Integrated Human Resources Information System  [PDF]
Sergey V. Zykov
Computer Science , 2006,
Abstract: Human resources management software is having a wide audience at present. However, no truly integrate solution has been proposed yet to improve the systems concerned. Approaches to extra data collection for appraisal decision-making are considered on the concept modeling theoretical basis. Current technologies in state-of-the-art HR management software are compared. Design and implementation aspects for a Web-wired truly integrated secure and scalable event-driven enterprise system are described. Benchmark results are presented. Field perspectives are discussed.
Exploration on access control to near space information resources
临近空间信息资源访问控制策略初探

FENG Xiao-sheng,LIU De-sheng,YUE Jun,ZHANG Wei-ming,
封孝生
,刘德生,乐俊,张维明

计算机应用研究 , 2008,
Abstract: This paper firstly analyzed the concept of the near space information resources(NSIR) and the incorporate joint application in the future,then bringed out the requirement of access control.It expatiated the concept of continuous,real-time and active control during the process of access,and based these it bringed out the SPAC-active access control model based on subject's preference knowledge.Discussed the concept model,formal definition of the model and designed the model frame.
Access Management of Virtual Information Resources Systems
虚拟信息资源体系的用户使用管理

Zhang Xiaolin,
张晓林

现代图书情报技术 , 2000,
Abstract: This paper describes the access management in virtual information resource syste ms, analyzes its concepts, functions, and technical mechanisms, gives illustrati ve examples.
Tomato Genomic Resources Database: An Integrated Repository of Useful Tomato Genomic Information for Basic and Applied Research  [PDF]
B. Venkata Suresh, Riti Roy, Kamlesh Sahu, Gopal Misra, Debasis Chattopadhyay
PLOS ONE , 2014, DOI: 10.1371/journal.pone.0086387
Abstract: Tomato Genomic Resources Database (TGRD) allows interactive browsing of tomato genes, micro RNAs, simple sequence repeats (SSRs), important quantitative trait loci and Tomato-EXPEN 2000 genetic map altogether or separately along twelve chromosomes of tomato in a single window. The database is created using sequence of the cultivar Heinz 1706. High quality single nucleotide polymorphic (SNP) sites between the genes of Heinz 1706 and the wild tomato S. pimpinellifolium LA1589 are also included. Genes are classified into different families. 5′-upstream sequences (5′-US) of all the genes and their tissue-specific expression profiles are provided. Sequences of the microRNA loci and their putative target genes are catalogued. Genes and 5′-US show presence of SSRs and SNPs. SSRs located in the genomic, genic and 5′-US can be analysed separately for the presence of any particular motif. Primer sequences for all the SSRs and flanking sequences for all the genic SNPs have been provided. TGRD is a user-friendly web-accessible relational database and uses CMAP viewer for graphical scanning of all the features. Integration and graphical presentation of important genomic information will facilitate better and easier use of tomato genome. TGRD can be accessed as an open source repository at http://59.163.192.91/tomato2/.
Integrated Circuits Testing: Remote Access to Test Equipment for Labs and Engineering  [cached]
Laurent Latorre,Beatrice Pradarelli,Pascal Nouet
International Journal of Online Engineering (iJOE) , 2009, DOI: 10.3991/ijoe.v5i5.1013
Abstract: This paper concerns the local and remote use of an Integrated Circuits (IC) Automated Test Equipment (ATE) for both educational and engineering purposes. This experience was initiated in 1998 in the context of a French network (CNFM) in order to provide a distant control to industrial equipment for academic and industrial people. The actual shared resource is a Verigy V93K System on Chip (SoC) tester platform. The cost of such an equipment is close to 1M€, without taking into account the maintenance and attached human resources expenses to make it work properly daily. Although the sharing of this equipment seems to be obvious for education, the French experience is quite a unique example in the world. Here, practical information regarding IC testing and network setup for remote access are detailed, together with the associated training program.
Co-building and Sharing of Information Resources
论信息资源的共建和共享

Huo Guoqing,
霍国庆

现代图书情报技术 , 1998,
Abstract: On basis of networking environment, this paper discusses digitalization of information resources, access and ownership of information resources, document delivery and its obstacles.
Authenticated Access to Reserved Network Resources  [cached]
Kenneth L. Calvert,Srinivasan Venkatraman,James. N. Griffioen
International Journal of Network Security , 2006,
Abstract: Enhanced network services often involve preferential allocation of resources such as transmission capacity (``bandwidth'') and buffer space to packets belonging to certain flows or traffic classes. Such services are vulnerable to denial-of-service attacks if access to those resources is granted based on information that can be forged, such as source and destination addresses and port numbers. Traditional message authentication codes (MACs) are not designed to solve this problem and have high per-packet processing costs. In this paper we propose a packet authentication algorithm specifically designed to solve the problem of protecting access to reserved network resources. We present measurements from a prototype implementation, and argue that our approach is a better solution for this problem than traditional MACs.
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.