Sciweavers

125 search results - page 20 / 25
» Comprehensive personalized information access in an educatio...
Sort
View
JCDL
2009
ACM
162views Education» more  JCDL 2009»
14 years 2 months ago
No bull, no spin: a comparison of tags with other forms of user metadata
User-contributed tags have shown promise as a means of indexing multimedia collections by harnessing the combined efforts and enthusiasm of online communities. But tags are only o...
Catherine C. Marshall
JCDL
2009
ACM
115views Education» more  JCDL 2009»
14 years 2 months ago
Using timed-release cryptography to mitigate the preservation risk of embargo periods
Due to temporary access restrictions, embargoed data cannot be refreshed to unlimited parties during the embargo time interval. A solution to mitigate the risk of data loss has be...
Rabia Haq, Michael L. Nelson
JCDL
2010
ACM
126views Education» more  JCDL 2010»
13 years 7 months ago
Discovering Australia's research data
Access to data crucial to research is often slow and difficult. When research problems cross disciplinary boundaries, problems are exacerbated. This paper argues that it is import...
Stefanie Kethers, Xiaobin Shen, Andrew E. Treloar,...
GFKL
2005
Springer
114views Data Mining» more  GFKL 2005»
14 years 1 months ago
Attribute-aware Collaborative Filtering
One of the key challenges in large information systems such as online shops and digital libraries is to discover the relevant knowledge from the enormous volume of information. Rec...
Karen H. L. Tso, Lars Schmidt-Thieme
JCDL
2006
ACM
141views Education» more  JCDL 2006»
14 years 1 months ago
An architecture for the aggregation and analysis of scholarly usage data
Although recording of usage data is common in scholarly information services, its exploitation for the creation of valueadded services remains limited due to concerns regarding, a...
Johan Bollen, Herbert Van de Sompel