This presentation by Dr Birgit Schmidt was given at the Scholarly Communication and Research Infrastructures Steering Committee Workshop. The workshop title was Libraries…
Security and Ethics in Ubiquitous Computing Environments Sudantha Gunawardena Security and Ethics in Ubiquitous Computing Environments Contents Abstract......................................................................................................................................…
Nomination for eIndia 2011 Awards Nomination By Indian Oil Corporation Limited Corporate Information Systems Department Corporate Business Technology centre Plot no 83, Sector…
Deep Underground Military Bases and the Black Budget A Lecture By Phil Schneider May 1995 Editor's Note: Phil Schneider, a very brave man, recently lost his life due…
1. Mira Dontcheva Steven M. Drucker David Salesin Michael F. Cohen Oct. 2007 UIST '07 Lin Yen Ling 20080930 /23 2. OUTLINE Introduction Related Work The Summaries Framework…
1. INSPIRE - ensuring access or continuity of access? Robin Rice1, Martin Donnelly2, Anne Robertson1 and James Reid1EDINA and Digital Curation CentreUniversity of Edinburgh…
1. Graph Connect San Francisco – 4 Oct 2013 by Sebastian Verheughe Using Graph Databases in Real-Time to Solve Resource Authorization at Telenor 2. Telenor Norway Subsidiary…
Joseph Amrith Raj's Webspher e Library • • Top of Form search-site Search this site Bottom of Form Home Autosys Job Management > • • Autosys Autosys Tutorial…