49,126 research outputs found

    Fourteenth Biennial Status Report: MĂ€rz 2017 - February 2019

    No full text

    In Search of a New Model: Library Resource Sharing in China - A Comparative Study

    Get PDF
    This paper reviews the framework of library resource sharing (LRS) in China and examines, from a comparative perspective, cases of recent development, particularly in the 1990s and early 2000s. Highlights include: (1) historical review of LRS in the U.S. and China, particularly in the areas of print union catalogs and union lists, online bibliographic utilities, and interlibrary loan; (2) literature review of Chinese publications, and LRS issues and challenges in China; (3) Analysis of three LRS models to provide a contextual grasp of a paradigm shift taking place in China; and (4) comparative analysis of LRS objectives, structure, and governance, etc., in the U.S. and China. The study also underscores the imperative for building a national digital library system in China to gain a competitive edge in resource sharing and to support the country’s rapid social and economic growth. At this stage of development, the success of China Academic Library & Information System provides a convincing argument for a national digital library system with its methods of governing, financing, and development

    Building an Emulation Environment for Cyber Security Analyses of Complex Networked Systems

    Full text link
    Computer networks are undergoing a phenomenal growth, driven by the rapidly increasing number of nodes constituting the networks. At the same time, the number of security threats on Internet and intranet networks is constantly growing, and the testing and experimentation of cyber defense solutions requires the availability of separate, test environments that best emulate the complexity of a real system. Such environments support the deployment and monitoring of complex mission-driven network scenarios, thus enabling the study of cyber defense strategies under real and controllable traffic and attack scenarios. In this paper, we propose a methodology that makes use of a combination of techniques of network and security assessment, and the use of cloud technologies to build an emulation environment with adjustable degree of affinity with respect to actual reference networks or planned systems. As a byproduct, starting from a specific study case, we collected a dataset consisting of complete network traces comprising benign and malicious traffic, which is feature-rich and publicly available
    • 

    corecore