scispace - formally typeset
Search or ask a question

Showing papers on "Authority control published in 2007"


Journal ArticleDOI
TL;DR: How HKUST Library planned and set up its institutional repository, how it acquired and processed the scholarly output, and what procedures and guidelines were established are described.
Abstract: Purpose – The purpose of this paper is to document Hong Kong University of Science and Technology's (HKUST's) experiences in developing its Institutional Repository and to highlight its programming developments in full‐text linking and indexing, and cross institutional searching.Design/methodology/approach – This paper describes how HKUST Library planned and set up its institutional repository, how it acquired and processed the scholarly output, and what procedures and guidelines were established. It also discusses some new developments in systems, including the implementation of OpenURL linking from the pre‐published version in the repository to the published sources; the partnership with Scirus to enable full‐text searching; and the development of a cross‐searching platform for institutional repositories in Hong Kong.Findings – The paper reveals what and why some policy issues should be adopted, including paper versioning, authority control, and withdrawal of items. It notes what proactive approaches sh...

20 citations


Patent
17 Oct 2007
TL;DR: In this paper, a method and system for controlling the user network access authority, including the presetting phase, is presented, which simplifies the dependency for network equipment and provides a direct control during the authentication, and dynamic address acquisition, simply and effectively realize the access authority control for different user authenticated.
Abstract: The invention provides a method and system for controlling the user network access authority, including the presetting phase: the corresponding relationship between the network equipment configuration address portion and the network access authority; the corresponding relationship between the combination configured unique user equipment identifier for RADIUS server and DHCP server and address pool information. After the user authentication, IP address allocation phase for dynamic address request and network access authority selection, controlling of user network access authority: the DHCP server and RADIUS server may get the address pool information according to the unique identifier of user equipment and return to the user equipment, the user equipment may get the network access authority for corresponding network equipment configuration according to this address pool information. With the invention, directly control during the authentication, and dynamic address acquisition, simply and effectively realize the network access authority control for different user authenticated, simplify the dependency for network equipment.

20 citations


Journal Article
TL;DR: The future will include a blend of centralised services, such as enterprise content management systems and institutional repositories, customer relationship management systems, and enterprise-level federated search engines, requiring the letting go of some much-loved 'traditional' frameworks.
Abstract: Knowledge Management and Information Management, often used synonymously, are concepts that librarians need to engage with in the future (if not already doing so). Librarians have a role within the organisation to demystify the concepts and to promote the benefits. Librarians and information professionals will have to envisage new ways of working, new organisational relationships, new services, and new professional roles, requiring the letting go of some much-loved 'traditional' frameworks. The future will include a blend of centralised services, such as enterprise content management systems and institutional repositories, customer relationship management systems, and enterprise-level federated search engines. The concepts of the library catalogue, authority control, classification and standards will be challenged by the rapidly expanding use of social networking tools, such as blogs and wikis.

8 citations


Journal ArticleDOI
TL;DR: Both the shared and unique characteristics of the most widely used personal managers of bibliographic reference data bases are analysed: Reference Manager, EndNote, ProCite, RefWorks and EndNote Web.
Abstract: Both the shared and unique characteristics of the most widely used personal managers of bibliographic reference data bases are analysed: Reference Manager, EndNote, ProCite, RefWorks and EndNote Web. The aspects considered include: data input, authority control, global editing commands, personal configuration of the data bases, reference exportation, visualization of records, insertion of bibliographic references and automatic generation of bibliographies.

8 citations


Journal Article
TL;DR: It is confirmed that the World Anti-Doping Agency (Wada) has approved the use of nanofiltration membranes for the recovery of phosphorous-contaminated wastewater from the Mediterranean Sea.
Abstract: هديکچ : ] هلاقم نيا [ نآ دربراک و هاگياج و يناگژاو راهم و دنتسم راهم اه رد تسرهف يسيون نيوـن ار فـيرعت يم دنک . اهدروكر ،دنتسم ي لياف ه يا يـم رارـق ثـحب دروم ار کي ره فادها و دربراک و دنتسم دـهد . داـجيا اهدروكر و دنتسم ي يعبانم هک هداد اه عمج نآ زا دنتسم ي يروآ يم دوش يم فيصوت ار دنک . رد ةراب حرط اه ي » دادارف ه ا ي « ن و يياسرا نآ راکـشآ و ددـعتم ياه اـه يـم ثـحب ك ـطبار هـب ؛دـن ة نيـب نيـلباد و روـک داوناـخ ة سا اهدرادنات ي کرام هب و ، بوچراهچ ود ره هک تيعقاو نيا يـمود و هداـس يـلوا هـک دنتسه يدرادناتسا ياه تسا قيقد و هديچيپ يم هراشا دنك . نع ناونع هب ار تيعنام و تيعماج ا حرط رد بولطم رص ياه هيامن يزاـس و يبايزاب يم صخشم دنك نآ و اه رد دنتسم راهم اب ار تسرهف اه م طبترم ي زاس د . تلاکشم تسرهف يسيون دانسا يم ثحب ار يکينورتکلا عبانم و مانرب کي و دنک ة نيـب يـللملا بوچراـچ رد » رـتنك يناـهج يتخانشـباتک ل « ) UBC ( ماظن کي زا هدافتسا اب ، نيب يللملا تسرهف يسيون يفيصوت و مان دنتسم لياف کي يانبم رب نيب يللملا يم داهنشيپ ار دنک هب و د يروف مادقا ابر ةر هئارا ياهداهنشيپ هدش توعد يم دنك . هژاوديلک اه : لياف ياه ،دنتسم تسرهف يسيون ، تسرهف يسيون نيـلبود ،يفيـصوت ،روـک اـهدروكر ،کراـم ي يناگژاو راهم ،هدادارف

8 citations


Patent
25 Sep 2007
TL;DR: In this article, an access authority control system for determining the access authority of a file, by referring to the operation log information of the file, is presented, where the file identification information is used to determine the propriety of an access from the user to the file.
Abstract: PROBLEM TO BE SOLVED: To provide an access authority control system for determining an access authority of a file, by referring to operation log information of the file, when determining the access authority of the file SOLUTION: This access authority control system has: an inquiry receiving part for receiving an inquiry about the propriety of an access from the user to the file, and file identification information of the file; an operation log information storage part for storing the operation log information at least for the file; an operation log information acquiring part for acquiring the corresponding operation log information from the operation log storage part, based on the received file identification information; an access propriety determining part for determining the access authority to the file by the user, using at least the acquired operation log information; and a warning notification part for indicating warning display to a prescribed computer terminal, when no access authority is determined as a determination result COPYRIGHT: (C)2009,JPO&INPIT

6 citations


Journal ArticleDOI
TL;DR: In this article, the authors compared four types of metadata with regard to object of the description, functions, scope, number of copies examined, collective vs individual creation, standardization, authority control, evidence, amount of descriptive detail, degression, time span the data is intended to last, and degree of evaluation.
Abstract: Cataloging is compared to descriptive bibliography, to enumerative bibliography and abstracting and indexing services as well as to metadata created by Web search engines or by nonprofessionals at sites such as Amazoncom These four types of metadata are compared with regard to object of the description, functions, scope, number of copies examined, collective vs individual creation, standardization, authority control, evidence, amount of descriptive detail, degression, time span the data is intended to last, and degree of evaluation

6 citations


Patent
29 Aug 2007
TL;DR: In this article, an XML document management server (DMS) gets authority configuration of user and determines whether the user is allowed carrying out operation in the requested operations; if yes, allowing user carrying out the said operation.
Abstract: Receiving operation request from user, XML document management server (DMS) gets authority configuration of user. Based on authority configuration of user, XML DMS determines whether the user is allowed carrying out operation in the requested operations; if yes, allowing user carrying out the said operation. Using management function of XDMS service level, the invention controls document resources allowed for user to create and manage. Thus, operation manager can implement differential services in order to reduce waste of system resources.

4 citations



01 Jan 2007
TL;DR: The authors presented at the 2007 American Library Association to the Authority Control Interest Group (ACIG) to discuss authority control in the library domain, and discussed the importance of authority control for libraries.
Abstract: Presentation delivered at the 2007 American Library Association to the Authority Control Interest Group.

1 citations


Journal ArticleDOI
TL;DR: The final project is BOPAC that has used modern technology to create faster and better access to a number of library catalogues worldwide and has demonstrated that authority control in its present form is not effective.
Abstract: SUMMARY This article describes cooperation between Bradford University Library and the Department of Computing that has resulted in nine research projects over a twenty-five year period on various aspects of bibliographic control. It recounts the origins of the Universal Standard Bibliographic Code (USBC) and its development for the identification of both books and non-book material. It then describes various aspects of the projects including simulating the merging necessary to set up a national database, the cleaning of a database, its use in inter-library lending, and its application together with expert systems for the quality control of databases. The final project is BOPAC that has used modern technology to create faster and better access to a number of library catalogues worldwide and has demonstrated that authority control in its present form is not effective.

Proceedings ArticleDOI
02 Jul 2007
TL;DR: The effectiveness of a simple anti-windup method in limiting the deterioration of the large signal behaviour which arises due to the various sources of saturation intrinsic to the limited authority architecture is demonstrated.
Abstract: This paper summarises the main findings of a study of the architecture of limited authority control systems for helicopters. The paper has two objectives. The first is to develop systematic methods which enable a given full authority controller of arbitrary type to be implemented in a limited authority framework in which the small signal performance is preserved. The second objective is to demonstrate the effectiveness of a simple anti-windup method in limiting the deterioration of the large signal behaviour which arises due to the various sources of saturation intrinsic to the limited authority architecture. The effectiveness of the proposed method is illustrated in simulation using a simple model of the NRC Bell 205 helicopter.

Patent
18 May 2007
TL;DR: In this paper, a system, method and device for controlling calling authority, wherein, the system includes plurality of users and user side calling control center, wherein the user-side calling control centre, for receiving a calling from an user, and determining whether or not the calling exceeds its authority based on the stored calling authority.
Abstract: A system, method and device for controlling calling authority, wherein, the system includes plurality of users and user side calling control center, wherein the user side calling control center, for receiving a calling from an user, and determining whether or not the calling exceeds its authority based on the stored calling authority, if so, then terminates this calling; if not, then joints this calling; user, for originating a calling to user side calling control center The system, method and device provided in this invention not only can easy realize calling authority control and provide convenience for user, but also can provide many kinds of calling authority control