54,388 research outputs found
Core Services in the Architecture of the National Digital Library for Science Education (NSDL)
We describe the core components of the architecture for the (NSDL) National
Science, Mathematics, Engineering, and Technology Education Digital Library.
Over time the NSDL will include heterogeneous users, content, and services. To
accommodate this, a design for a technical and organization infrastructure has
been formulated based on the notion of a spectrum of interoperability. This
paper describes the first phase of the interoperability infrastructure
including the metadata repository, search and discovery services, rights
management services, and user interface portal facilities
Smart Signs: Showing the way in Smart Surroundings
This paper presents a context-aware guidance and messaging
system for large buildings and surrounding venues. Smart Signs are
a new type of electronic door- and way-sign based on wireless sensor networks.
Smart Signs present in-situ personalized guidance and messages,
are ubiquitous, and easy to understand. They combine the easiness of
use of traditional static signs with the flexibility and reactiveness of navigation
systems. The Smart Signs system uses context information such
as userās mobility limitations, the weather, and possible emergency situations
to improve guidance and messaging.
Minimal infrastructure requirements and a simple deployment tool make
it feasible to easily deploy a Smart Signs system on demand.
An important design issue of the Smart Signs system is privacy: the
system secures communication links, does not track users, allow almost
complete anonymous use, and prevent the system to be used as a tool
for spying on users
Access and usability issues of scholarly electronic publications
This chapter looks at the various access and usability issues related to scholarly information resources. It first looks at the various channels through which a user can get access to scholarly electronic publications. It then discusses the issues and studies surrounding usability. Some important parameters for measuring the usability of information access systems have been identified. Finally the chapter looks at the major problems facing the users in getting access to scholarly information through today's hybrid libraries, and mentions some possible measures to resolve these problems
My private cloud--granting federated access to cloud resources
We describe the research undertaken in the six month JISC/EPSRC funded My Private Cloud project, in which we built a demonstration cloud file storage service that allows users to login to it, by using their existing credentials from a configured trusted identity provider. Once authenticated, users are shown a set of accounts that they are the owners of, based on their identity attributes. Once users open one of their accounts, they can upload and download files to it. Not only that, but they can then grant access to their file resources to anyone else in the federated system, regardless of whether their chosen delegate has used the cloud service before or not. The system uses standard identity management protocols, attribute based access controls, and a delegation service. A set of APIs have been defined for the authentication, authorisation and delegation processes, and the software has been released as open source to the community. A public demonstration of the system is available online
An Architecture for Provenance Systems
This document covers the logical and process architectures of provenance systems. The logical architecture identifies key roles and their interactions, whereas the process architecture discusses distribution and security. A fundamental aspect of our presentation is its technology-independent nature, which makes it reusable: the principles that are exposed in this document may be applied to different technologies
Architecture for Provenance Systems
This document covers the logical and process architectures of provenance systems. The logical architecture identifies key roles and their interactions, whereas the process architecture discusses distribution and security. A fundamental aspect of our presentation is its technology-independent nature, which makes it reusable: the principles that are exposed in this document may be applied to different technologies
- ā¦