13,005 research outputs found
Using Search Engine Technology to Improve Library Catalogs
This chapter outlines how search engine technology can be used in online public access library
catalogs (OPACs) to help improve usersâ experiences, to identify usersâ intentions, and to indicate
how it can be applied in the library context, along with how sophisticated ranking criteria can be
applied to the online library catalog. A review of the literature and current OPAC developments
form the basis of recommendations on how to improve OPACs. Findings were that the major
shortcomings of current OPACs are that they are not sufficiently user-centered and that their results
presentations lack sophistication. Further, these shortcomings are not addressed in current 2.0
developments. It is argued that OPAC development should be made search-centered before
additional features are applied. While the recommendations on ranking functionality and the use of
user intentions are only conceptual and not yet applied to a library catalogue, practitioners will find
recommendations for developing better OPACs in this chapter. In short, readers will find a
systematic view on how the search enginesâ strengths can be applied to improving librariesâ online
catalogs
A Taxonomy of Data Grids for Distributed Data Sharing, Management and Processing
Data Grids have been adopted as the platform for scientific communities that
need to share, access, transport, process and manage large data collections
distributed worldwide. They combine high-end computing technologies with
high-performance networking and wide-area storage management techniques. In
this paper, we discuss the key concepts behind Data Grids and compare them with
other data sharing and distribution paradigms such as content delivery
networks, peer-to-peer networks and distributed databases. We then provide
comprehensive taxonomies that cover various aspects of architecture, data
transportation, data replication and resource allocation and scheduling.
Finally, we map the proposed taxonomy to various Data Grid systems not only to
validate the taxonomy but also to identify areas for future exploration.
Through this taxonomy, we aim to categorise existing systems to better
understand their goals and their methodology. This would help evaluate their
applicability for solving similar problems. This taxonomy also provides a "gap
analysis" of this area through which researchers can potentially identify new
issues for investigation. Finally, we hope that the proposed taxonomy and
mapping also helps to provide an easy way for new practitioners to understand
this complex area of research.Comment: 46 pages, 16 figures, Technical Repor
Kerala Libraries Network (KELNET): a Proposal
Visualizes the conceptual framework and propose the
development of a Kerala Library Network (KELNET) by exploring and exploiting the available and the existing social infrastructures, social softwares, open standards and
technologies
A Mobile Ambients-based Approach for Network Attack Modelling and Simulation
Attack Graphs are an important support for assessment and subsequent improvement of network security. They reveal possible paths an attacker can take to break through security perimeters and traverse a network to reach valuable assets deep inside the network. Although scalability is no longer the main issue, Attack Graphs still have some problems that make them less useful in practice. First, Attack Graphs remain difficult to relate to the network topology. Second, Attack Graphs traditionally only consider the exploitation of vulnerable hosts. Third, Attack Graphs do not rely on automatic identification of potential attack targets. We address these gaps in our MsAMS (Multi-step Attack Modelling and Simulation) tool, based on Mobile Ambients. The tool not only allows the modelling of more static aspects of the network, such as the network topology, but also the dynamics of network attacks. In addition to Mobile Ambients, we use the PageRank algorithm to determine targets and hub scores produced by the HITS (Hypertext Induced Topic Search) algorithm to guide the simulation of an attacker searching for targets
- âŠ