16 research outputs found

    Multi-Faceted Search and Navigation of Biological Databases

    Get PDF

    A log analysis study of 10 years of ebook consumption in academic library collections

    Get PDF
    Even though libraries have been offering eBooks for more than a decade, very little is known about eBook access and consumption in academic library collections. This paper addresses this gap with a log analysis study of eBook access at the library of the University of Waikato. This in-depth analysis covers a period spanning 10 years of eBook use at this university. We draw conclusions about the use of eBooks at this institution and compare the results with other published studies of eBook usage at tertiary institutes

    Separating Between Trust and Access Control Policies: A Necessity for Web Applications

    No full text
    Abstract: As Security is the key of success for Web Applications most of the efforts that have been put in this domain have focused on wining users ’ trust to adopt the Web environment for their business operations. Although user trust is of paramount importance for Web applications, one also needs to consider Web applications trust towards users here after referred to as user trustworthiness. This paper explains why management of trust/mistrust is an increasing security issue in Web environment and proposes an authorization architecture framework that clearly separates between access control policies and mistrust management. It also describes a model that evaluates trustworthiness of users trust towards its integration in the authorization process. 1

    User behavior tendencies on data collections in a digital library

    No full text
    Abstract. We compare the usage of a Digital Library with many different categories of collections, by examining its log files for a period of twenty months, and we conclude that the access points that the users mostly refer to, depend heavily on the type of content of the collection, the detail of the existing metadata and the target user group. We also found that most users tend to use simple query structures (e.g. only one search term) and very few and primitive operations to accomplish their request. Furthermore, as they get more experienced, they reduce the number of operations in their sessions.

    Correction to: Pointwise Optimal Control for Diffusion Problems of Missing Data

    No full text

    Search Engines with Faceted Search

    No full text
    corecore