49,126 research outputs found
In Search of a New Model: Library Resource Sharing in China - A Comparative Study
This paper reviews the framework of library resource sharing (LRS) in China and examines, from a comparative perspective, cases of recent development, particularly in the 1990s and early 2000s. Highlights include: (1) historical review of LRS in the U.S. and China, particularly in the areas of print union catalogs and union lists, online bibliographic utilities, and interlibrary loan; (2) literature review of Chinese publications, and LRS issues and challenges in China; (3) Analysis of three LRS models to provide a contextual grasp of a paradigm shift taking place in China; and (4) comparative analysis of LRS objectives, structure, and governance, etc., in the U.S. and China. The study also underscores the imperative for building a national digital library system in China to gain a competitive edge in resource sharing and to support the countryâs rapid social and economic growth. At this stage of development, the success of China Academic Library & Information System provides a convincing argument for a national digital library system with its methods of governing, financing, and development
Building an Emulation Environment for Cyber Security Analyses of Complex Networked Systems
Computer networks are undergoing a phenomenal growth, driven by the rapidly
increasing number of nodes constituting the networks. At the same time, the
number of security threats on Internet and intranet networks is constantly
growing, and the testing and experimentation of cyber defense solutions
requires the availability of separate, test environments that best emulate the
complexity of a real system. Such environments support the deployment and
monitoring of complex mission-driven network scenarios, thus enabling the study
of cyber defense strategies under real and controllable traffic and attack
scenarios. In this paper, we propose a methodology that makes use of a
combination of techniques of network and security assessment, and the use of
cloud technologies to build an emulation environment with adjustable degree of
affinity with respect to actual reference networks or planned systems. As a
byproduct, starting from a specific study case, we collected a dataset
consisting of complete network traces comprising benign and malicious traffic,
which is feature-rich and publicly available
- âŠ