Search
« Previous | 21 - 40 of 333 | Next »
Search Results
-
21. [Article] Heard on the Net: What Library Practices are Scalable?
This column explores OCLC Web-scale Management Services (WMS).Citation -
22. [Article] Report on Coastal Mapping and Informatics Trans-Atlantic Workshop 2: Coastal Atlas Interoperability
Workshop ProceedingsCitation -
Most data are associated with a place, and many are also associated with a moment in time, a time interval, or another linked temporal component. Spatiotemporal data (i.e., data with elements of both space ...
Citation -
24. [Article] Arts education transforms learning
This archived document is maintained by the Oregon State Library as part of the Oregon Documents Depository Program. It is for informational purposes and may not be suitable for legal purposes.Citation -
25. [Article] Persona concept : system architecture and prototypes
This project explores a security framework, called the Persona Concept, aimed at giving the user greater control over their private data in cyberspace, in particular, their electronic credentials. The ...Citation -
This is the publisher’s final pdf. The published article is copyrighted by BioMed Central Ltd. and can be found at: http://www.biomedcentral.com/.
Citation -
27. [Article] The Possibilities are Measurable: Evaluating Innovation, Learning, and Strategic Thinking within Library Technology Units
Presentation was for the 7th International Evidence Based Library and Information Practice conference held at the University of Saskatchewan in Saskatoon July 15-18th, 2013.Citation -
28. [Article] Technology in Practice. A Library in Your Pocket
The article discusses the development of library Web pages designed for viewing on mobile devices and cell phones. The use of smartphones and cell phones to access internet content, library services that ...Citation -
29. [Article] Adaptive Composite Map Projections
This is the author's peer-reviewed final manuscript, as accepted by the publisher. The published article is copyrighted by IEEE-Institute of Electrical and Electronics Engineers and can be found at: http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2945. ...Citation -
7 pages
Citation -
31. [Article] Addressing Automated Adversaries of Network Applications
The Internet supports a perpetually evolving patchwork of network services and applications. Popular applications include the World Wide Web, online commerce, online banking, email, instant messaging, ...Citation -
What has the growth in web-scale discovery services meant for information literacy instruction? And what kind of threshold concepts do students need to grasp before they can use these tools effectively? ...
Citation -
33. [Article] HealthLinks: A ColdFusion Web Application
Also published as a chapter in Database-Driven Web Sites (ed: Kristin Antelman) The Haworth Information Press, an imprint of The Haworth Press, Inc., 2002, pp. 63-88.Citation -
34. [Article] Quantification of Biomass Production Potentials from Trees Outside Forests—A Case Study from Central Germany
This is an author's peer-reviewed final manuscript, as accepted by the publisher. The published article is copyrighted by Springer and can be found at: http://www.springer.com/life+sciences/plant+scien...Citation -
35. [Article] Computing News ; vol. 21, no. 03 (Summer 2006)
24 p.Citation -
36. [Article] Interactive HTML
As the World Wide Web continues to grow, people clearly want to do much more with it than just publish static pages of text and graphics. While such increased interactivity has traditionally been accomplished ...Citation -
2 pages
Citation -
Purpose- Advancements in online discovery require academic librarians to develop new means of teaching and assessing information literacy, with an emphasis on having students employ critical thinking to ...
Citation -
Fisheries management has been traditionally single-species oriented. Only recently more pressure has been put on developing a holistic, science-based approach that considers the ecosystem as a whole. This ...
Citation -
Spammers are continually looking to circumvent counter-measures seeking to slow them down. An immense amount of time and money is currently devoted to hiding spam, but not enough is devoted to effectively ...
Citation