scispace - formally typeset
Search or ask a question

Showing papers on "Microsoft Windows published in 2002"


Patent
06 Feb 2002
TL;DR: In this article, the authors enable the display of application output data within application output windows embedded in a web browser window, even when the application program providing the source of the application-output data is non-web enabled (e.g., legacy applications).
Abstract: The invention enables the display of application-output data within application-output windows embedded in a web browser window. The application-output windows can be dynamically moved, resized and otherwise manipulated within the web browser window even when the application program providing the source of the application-output data is non-web enabled (e.g., legacy applications). The invention receives window attribute information associated with the application-output windows via a first virtual channel and displays application-output data received via a second virtual channel within the application-output windows, which are formed and/or modified using the window attribute information.

165 citations


Journal ArticleDOI
TL;DR: MultiSpec as mentioned in this paper is a multispectral image data analysis software application for both the Apple Macintosh and Microsoft Windows operating systems (OS) that is intended to provide a fast, easy-to-use means for analysis of multi-sensor image data such as that from the Landsat, SPOT, MODIS or IKONOS series of Earth observational satellites.

159 citations


Journal ArticleDOI
TL;DR: A free open source toolbox for the analysis of multi-electrode data based on the common data analysis environment MATLAB (version 5.3-6.1) is introduced, and functions are controlled via command line input and graphical user interfaces.

134 citations


Book ChapterDOI
Frank Apap1, Andrew Honig1, Shlomo Hershkop1, Eleazar Eskin1, Sal Stolfo1 
16 Oct 2002
TL;DR: In this paper, a host-based intrusion detection system (IDS) for Microsoft Windows is presented, which detects attacks on a host machine by looking for anomalous accesses to the Windows registry.
Abstract: We present a host-based intrusion detection system (IDS) for Microsoft Windows The core of the system is an algorithm that detects attacks on a host machine by looking for anomalous accesses to the Windows Registry The key idea is to first train a model of normal registry behavior on a windows host, and use this model to detect abnormal registry accesses at run-time The normal model is trained using clean (attack-free) data At run-time the model is used to check each access to the registry in real time to determine whether or not the behavior is abnormal and (possibly) corresponds to an attack The system is effective in detecting the actions of malicious software while maintaining a low rate of false alarms

113 citations


Journal Article
TL;DR: A host-based intrusion detection system for Microsoft Windows that detects attacks on a host machine by looking for anomalous accesses to the Windows Registry, which is effective in detecting the actions of malicious software while maintaining a low rate of false alarms.
Abstract: We present a host-based intrusion detection system (IDS) for Microsoft Windows. The core of the system is an algorithm that detects attacks on a host machine by looking for anomalous accesses to the Windows Registry. The key idea is to first train a model of normal registry behavior on a windows host, and use this model to detect abnormal registry accesses at run-time. The normal model is trained using clean (attack-free) data. At run-time the model is used to check each access to the registry in real time to determine whether or not the behavior is abnormal and (possibly) corresponds to an attack. The system is effective in detecting the actions of malicious software while maintaining a low rate of false alarms.

91 citations


Journal ArticleDOI
TL;DR: The advantages related to standardization of the CACSD design tools will enable educators to confront the additional budget constraint and limited teaching resources issue by facilitating the sharing of laboratory resources within each university and the development of Internet laboratory experiences for students.
Abstract: This paper seeks to begin a discussion with regard to developing computer aided control system design (CACSD) tools to promote undergraduate controls laboratory development. The advocated CACSD design tools are based on the popular, commercially available MATLAB environment, the Simulink toolbox, and the Real-Time Workshop toolbox. This paper describes how these tools can be utilized to address several issues that are confronted by control systems educators including: standardization, budget constraints, and limited resources. Specifically, by confronting the standardization issue, the following advantages are realized for laboratory development: (1) the required computer hardware will be low cost; (2) commercially available plants from different manufacturers can be supported under the same CACSD environment with no hardware modifications; (3) both the Windows and Linux operating systems can be supported via the MATLAB based Real-Time Windows Target and the Quality Real-Time Systems (QRTS) based Real-Time Linux Target; and (4) the Simulink block diagram approach can be utilized to prototype control strategies, thereby, eliminating the need for low level programming skills. The advantages related to standardization of the CACSD design tools will enable educators to confront the additional budget constraint and limited teaching resources issue by facilitating: (1) the sharing of laboratory resources within each university (i.e., between departments); (2) the development of Internet laboratory experiences for students (i.e., between universities); and (3) the initiation of an Internet-based archive of laboratory tutorials and Simulink files for in-house developed plants and commercially available plants.

71 citations


Book
16 May 2002
TL;DR: Windows XP Home Edition: The Missing Manual is a one-stop reference for the Windows user and features superb writing, special features for both absolute novices and power users, and complete coverage.
Abstract: From the Publisher: Windows XP is the latest, most reliable, and best-looking version of the world's most widely used operating system. The new Windows combines the same stress-tested, extremely stable engine that drives Windows 2000-Microsoft's corporate operating system-with the far superior compatibility of Windows Me. Windows XP offers dozens of important new features. In addition to the vastly more elegant user interface, it offers drag-and-drop CD burning, powerful built-in features for viewing and managing digital photos and music, and a Remote Assistance feature that lets invited PC gurus or help-desk technicians see and even manipulate what's on your screen over the Internet. But one major failing of Windows remains unaddressed in the XP edition: It comes without a single page of printed instructions. In Windows XP Home Edition: The Missing Manual, New York Times technology columnist (and Missing Manual series creator) David Pogue provides the friendly, authoritative book that should have been in the box. It's the ideal users' guide for the world's most popular operating system. The book begins at the beginning: with a tour of the Desktop, the new, two-column Start menu, and instructions for customizing the Taskbar and toolbars. A special focus: Organizing files, folders, and windows for maximum efficiency and minimum clutter. More advanced chapters explore each control panel and built-in application; walk through every conceivable configuration (setting up a PC for Internet use, peripheral equipment, laptop life, and so on); and setting up a small network, including how to share a single Internet connection among several PCs. Finally, special chapters are dedicated tostandard rituals of Windows life: troubleshooting, installation, and upgrading. Windows XP Home Edition: The Missing Manual is a one-stop reference for the Windows user. In keeping with the high standards of the Missing Manual line, the book features superb writing, special features for both absolute novices and power users, and complete coverage. If Microsoft could wave its magic software wand and wish for the perfect guide to its flagship product, Windows XP Home Edition: The Missing Manual would appear like magic.

48 citations


Book
01 Jan 2002
TL;DR: This .NET-ready Windows programming guide shows you how to get the most out of Windows Forms-the next-generation Windows programming class library and discovers how to use C# to create dynamic user interfaces and graphical outputs for Windows applications.
Abstract: "Look it up in Petzold" remains the last word on Windows development. In this .NET-ready Windows programming guide, the best-selling author shows you how to get the most out of Windows Forms-the next-generation Windows programming class library. You'll discover how to use C# to create dynamic user interfaces and graphical outputs for Windows applications. With dozens of examples of client applications to illustrate common techniques and plenty of no-nonsense advice on best programming practices, you'll be C# sharp in no time. Topics covered in this guide include: * A tour of C# * Windows Forms * Essential structures * An exercise in text output * Lines, curves, and area fills * Tapping into the keyboard * Pages and transforms * Taming the mouse * Text and fonts * The timer and time * Images and bitmaps * Buttons, labels, and scrolls * B'ers and other splines * Menus * Paths, regions, and clipping * Dialog boxes * Brushes and pens * Edit, list, and spin controls * Font fun * Toolbars and status bars * Printing * Tree view and List view * Metafiles * Clip, drag, and drop INCLUDED ON CD-ROM: * Sample source code for all the examples presented in the book For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.

47 citations


Book
01 Dec 2002
TL;DR: The author offers a solid overview of the Windows Driver Model (WDM) architecture and breaks down the process of writing custom device drivers into manageable pieces-from the basics of loading device drivers to creating and processing I/O request packets.
Abstract: From the Publisher: Written for advanced programmers who use C and C++, the second edition of this popular technical guide illustrates and clarifies real-world driver programming issues for current versions of Microsoft Windows. The author offers a solid overview of the Windows Driver Model (WDM) architecture and breaks down the process of writing custom device drivers into manageable pieces-from the basics of loading device drivers to creating and processing I/O request packets. This edition includes updated information about Windows XP, Windows 2000, and Windows Me, plus extensive practical examples, illustrations, and line-by-line analysis of code samples.

44 citations


Patent
07 Jun 2002
TL;DR: The system described in this article extends the server described in application Ser. No. 09/596/305 to allow the content of browser windows or the interaction of window windows to affect other browsers or to be affected by other browsers.
Abstract: The system described herein extends the server described in application Ser. No. 09/596,305 to allow the content of browser windows or the interaction of browser windows to affect other browser windows or to be affected by other browser windows. This system of linked browser windows allows intelligence to be added to the system specified in application Ser. No. 09/596,305. Changes affecting a browser window can now have ripple effects through the landscape for various uses, e.g., data can propagate more visibly, easily and transparently, “what-if” scenarios are possible, error and special conditions can be highlighted at a glance, etc.

42 citations


Journal ArticleDOI
TL;DR: A series of manually executed macros written in Visual Basic for Microsoft Excel spreadsheets that allows for rapid and comprehensive gene expression data analysis and can be used in their present form by others working with commercial E. coli membrane arrays.
Abstract: Microsoft® Windows®-based computers have evolved to the point that they provide sufficient computational and visualization power for robust analysis of DNA array data. In fact, smaller laboratories might prefer to carry out some or all of their analyses and visualization in a Windows environment, rather than alternative platforms such as UNIX. We have developed a series of manually executed macros written in Visual Basic for Microsoft Excel ® spreadsheets, that allows for rapid and comprehensive gene expression data analysis. The first macro assigns gene names to spots on the DNA array and normalizes individual hybridizations by expressing the signal intensity for each gene as a percentage of the sum of all gene intensities. The second macro streamlines statistical consideration of the confidence in individual gene measurements for sets of experimental replicates by calculating probability values with the Student’s t test. The third macro introduces a threshold value, calculates expression ratios between experimental conditions, and calculates the standard deviation of the mean of the log ratio values. Selected columns of data are copied by a fourth macro to create a processed data set suitable for entry into a Microsoft Access ® database. An Access database structure is described that allows simple queries across multiple experiments and export of data into third-party data visualization software packages. These analysis tools can be used in their present form by others working with commercial E. coli membrane arrays, or they may be adapted for use with other systems. The Excel spreadsheets with embedded Visual Basic macros and detailed instructions for their use are available at http://www.ou.edu/microarray.

Patent
19 Feb 2002
TL;DR: In this article, the authors present a thorough method for restricting which operations (processes) can be run by a user on a single workstation computer or by a users on a session in a multi-user environment, such as Microsoft Windows 2000 Terminal Services.
Abstract: A thorough method for restricting which operations (processes) can be run by a user on a single workstation computer or by a user on a session in a multi-user environment, such as Microsoft Windows 2000 Terminal Services. By default, all applications (processes) are disallowed. Only explicitly assigned applications (processes) are allowed to run. The method entails running two software modules in user mode, one of which maintains a list of allowed processes for each user and one of which monitors new processes as they are started. When a new process is started the monitoring module sends the process ID to the list module. The list module checks the ID against its list and kills the process if it is not authorized. This way, only processes created by users are validated as apposed to validating all file I/O (processor intensive). This decreases the processing requirements.

Journal ArticleDOI
01 Dec 2002
TL;DR: Two major approaches to full-screen magnification for modern multiple window systems (the paper focuses on Microsoft Windows) are presented, namely, using multimonitor support and true type fonts for text enlargement.
Abstract: This paper presents the basic features of software-based magnifiers used by some visually impaired people to read information from a computer screen. The paper briefly presents two major approaches to full-screen magnification for modern multiple window systems (the paper focuses on Microsoft Windows). This paper describes in detail the architecture and operation of a full-screen magnifier that uses Microsoft DirectX Overlays. This approach leads to a robust magnifier that has a low computational overhead. The magnifier has problems with video cards that use a YUV color model but these problems may be addressed by RGB to YUV translation software - an issue that is still to be investigated. The magnifier also has problems when the generic device driver, rather than the manufacturer's device driver, is installed on the system. The paper presents two further strategies for full screen magnification, namely, using multimonitor support and true type fonts for text enlargement.

Proceedings ArticleDOI
11 Mar 2002
TL;DR: This paper investigates techniques to protect Windows-based systems from malicious mobile code while minimizing functionality loss, and involves writing a layer of protective code that is able to detect mobile code running on a system and then monitors its behavior.
Abstract: Mobile code---executable programs that get copied from computer-to-computer via e-mail, web browsers, etc.---is a popular way to stage malicious attacks against users. The Windows operating system is often the target of such attacks, in part because of its ubiquity and in part because of the vast functionality it provides. Some of this functionality, like executable e-mail attachments and scripting, provides opportunity for mobile code to cause significant damage to a host system. One obvious solution is to disable such features in Windows. However, many users find such features a convenient and productive way to conduct their business. Thus, techniques that can protect against mobile code without sacrificing functionality are needed.But even disabling functionality such as scripting will not provide complete security; it only catches the most sophomoric exploits. All operating systems, including Windows, are vulnerable to malicious use at their lowest level of operation: executing compiled code. Mobile programs, just like local programs, can access operating system components in ways that damage a users' data or render their computer useless. These programs can be written in system-level languages such as C and assembly, which are capable of compiling OS components directly into their binaries and writing directly to interrupt vectors. Disabling such functionality will mean an operating system that simply doesn't work.This paper investigates techniques to protect Windows-based systems from malicious mobile code while minimizing functionality loss. Our solution involves writing a layer of protective code that is able to detect mobile code running on a system and then monitors its behavior. Behaviors deemed benign are allowed to execute; behaviors deemed malicious are either shutdown, quarantined or logged (so that restoration procedures can be constructed). We describe new techniques for identifying. monitoring and neutralizing malicious mobile code. We demonstrate the techniques by testing our "vaccine" against a number of the most notorious Windows viruses and worms. Further, we demonstrate how our solution maintains functionality while minimizing false positives during execution of benign programs.

01 Jan 2002
TL;DR: User data often remains stored on disk drives when they are discarded, transferred to another user, or returned off lease, and can be unreachable by erasure programs.
Abstract: Consequently, user data often remains stored on disk drives when they are discarded, transferred to another user, or returned off lease. Even if users delete their files, they can be recovered from “recycling” folders or by special programs such as Norton Unerase. Other special programs are available to more definitely erase user data, such as Norton WipeInfo, which offers a “Government Wipe.” Because these are special programs, they are not widely known or used. Additionally, some user data can be unreachable by erasure programs, such as drive data blocks removed from use due to excessive errors. (These blocks are reassigned to other disk locations, and the defective record area is marked unusable in the drive’s “g-list”but the original data can remain in g-list sectors.) Norton WipeInfo only runs on older Windows OS, and wipes an individual folder.

Book
11 Oct 2002
TL;DR: This no-nonsense primer reveals little-known Windows registry techniques, tricks, tips, and secrets to make the tasks of IT professionals and desktop power users easier.
Abstract: Discover how to customize the registry-and how to take care of it-with this no-nonsense primer It reveals little-known Windows registry techniques, tricks, tips, and secrets to make the tasks of IT professionals and desktop power users easier

Journal ArticleDOI
TL;DR: This technical tutorial gives thorough instructions for creating a reversal graph with most recent versions of Microsoft Word including Word for Windows 2003 and for Mac 2004 while conforming to the Manuscript Preparation Checklist in the Journal of Applied Behavior Analysis.
Abstract: The single-subject reversal design graph is a critical element to basic research and applied behavior analysis. This technical tutorial gives thorough instructions for creating a reversal graph with most recent versions of Microsoft Word including Word for Windows 2003 and for Mac 2004. Directions for use with prior versions of this program are included. Following these step-by-step instructions will yield graphs that conform to the Manuscript Preparation Checklist in the Journal of Applied Behavior Analysis (2000). Key words: single-subject reversal design, MS Word (tm) graphs, tutorial ********** Graphic representation of repeated measurement data is critical in basic research and applied behavior analysis. The purpose of this tutorial is to produce single subject design (SSD) graphs using Microsoft Word (tm) while conforming to the Manuscript Preparation Checklist (Journal of Applied Behavior Analysis, 2000). (1) Microsoft Word is an excellent, ubiquitous word processing program and has several features that make it well-suited to create graphs. For example, it has built-in flexible graphing features, and the resulting diagrams can be used in presentations, printed for journal submission, or posted into presentation program such as PowerPoint. Furthermore, by following the directions in this tutorial, it is possible to save templates, allowing the reader to create multiple SSD graphs while only changing data points and labels. Using templates lessens the amount of formatting needed to properly produce SSD graphs. Microsoft Excel also provides graphing abilities (Carr & Burkholder, 1998; Moran & Hirschbine, 2002), but using the features built into Word saves time and reduces the issues related to converting graphs for use in word processing or presentation software. Both Microsoft Word 2003 for Windows and Word 2004 for Macintosh are covered in this tutorial. These directions also apply to prior versions; however, each one includes minor variations in procedure. When possible, comments are included to allow users of prior versions to successfully complete these steps. This tutorial assumes the reader has a working knowledge of their operating system, but no experience with Word's charting features. Remember to save your work often while developing a SSD graph. Starting the Word Document for Graphing To begin production of a SSD graph, start with an open Word document. Click on the Insert menu at the top of the screen and select the menu item labeled "Object ..." A dialog box of options titled "Object" will appear. Under the file tab "Create New," scroll down the list and click on item labeled "Microsoft Graph Chart" and click "OK." Note that Word refers to graphs as "charts." A separate window entitled "Datasheet" will appear. Sample data is included in the spreadsheet and by default the chart contains a bar graph of the sample data. You will be replacing the sample data and reformatting the graph, but before doing so, it is necessary to become oriented to how Word handles chart editing. Orienting to the Chart Editing Environment Word is a multifunction program, and chart editing is handled separately from word processing. An application named "Microsoft Graph" handles chart editing. Different versions of Word vary with how explicit these two environments are from each other. For example, with recent Windows PC versions, Microsoft Graph is fully integrated within the Word window so that when a chart is selected, the relevant tools and menus appear in Word. When you click away from the chart to deselect it, the menus and buttons go back to those intended to edit text. Double clicking the chart area engages chart editing capabilities. In contrast, on the Mac, Microsoft Graph is launched automatically as a separate application when the user "double clicks" the chart. Once the reader has finished editing the graph, quitting the Graph application on the Mac returns the user into Word to edit the text. …

Book
01 Apr 2002
TL;DR: This book shows how C# and the .NET framework can be used to develop Windows applications with .NET, and provides a chapter-by-chapter guide to building an image application to view, share, and manage digital photos stored on a hard drive or on removable media.
Abstract: From the Publisher: The new C# language and Internet software services have received much of the attention surrounding Microsoft's new .NET environment. However, Microsoft has also redesigned the way Windows desktop applications will be created and deployed in the future. Intended as a tutorial for C++ and Java programmers at all levels, this book shows how C# and the .NET framework can be used to develop Windows applications with .NET. As a way to demonstrate how Windows Forms applications are constructed, the book provides a chapter-by-chapter guide to building an image application to view, share, and manage digital photos stored on a hard drive or on removable media. Also discussed are Visual Studio 7.0, C# language syntax and usage, Windows Forms controls, ADO.NET, and other topics vital to the creation and deployment of Windows applications in this new environment. Author Biography: Erik Brown is a consultant specializing in intellectual property and Windows application development. He has been involved in software development for over 10 years and is a veteran of multiple startup companies working with both UNIX and Windows platforms. He lives in Gainesville, Virginia.

Patent
09 Dec 2002
TL;DR: In this paper, the authors present a method for controlling access to and modification of information stored on a storage medium forming part of a computer system comprising of a plurality of non-overlapping partitions including a boot partition and at least one general partition.
Abstract: There is disclosed a method and apparatus for controlling access to and corruption of information in a computer system. In known “PC Virus” protection methods the boot partition becomes “Read Only” when the system is in Supervised Mode. However, Microsoft Windows, although not strictly self-modifying, does require that certain files located within the Windows directory, can be written to. Accordingly the present invention provides a method of controlling access to and modification of information stored on a storage medium forming part of a computer system comprising: dividing information stored on the storage medium into a plurality of non-overlapping partitions including a boot partition and at least one general partition, characterised by: designating at least one of said partitions a Write Many Recoverable (WMR) partition wherein, in use, if a write command is issued to overwrite any resident information stored in a/the WMR partition by updating information is written on the storage medium in a location other than where the resident information is stored and a (virtual) pointer to the updated information is set up/kept so that the updated information can be accessed, as required during a remainder of a session.


Patent
20 Nov 2002
TL;DR: In this article, a device driving system including an additional driver, interposed between the operating system and an existing installed driver and configured to interface directly with the operating systems, is presented.
Abstract: The invention relates to systems for driving computer peripherals having features, such as 3D sound capability, which are not envisaged by generic operating system for the computer. In order to adapt computers subject to existing operating systems, such as the Microsoft Windows family of systems, to such peripherals for which there is thus no driver capability, the invention provides a device driving system including additional driver, interposed between the operating system and an existing installed driver and configured to interface directly with the operating system. The additional driver is preferably also configured to interface with the existing installed driver.



Proceedings ArticleDOI
04 Mar 2002
TL;DR: The salient feature of the system is the extension of the client-server architecture to two-tiers, with the web server serving client requests whilst acting as client to the tool servers.
Abstract: We present the concept of a distributed, web-based electronic design framework. The salient feature of our system is the extension of the client-server architecture to two-tiers, with the web server serving client requests whilst acting as client to the tool servers. In the sample application of the framework, developed in Java, any of the servers can be based on Linux, MS Windows or SunSPARC server. The web server that has been used to demonstrate the framework for on-line access to VAMS (a VHDL-AMS parser) and Avant! HSPICE is currently available for Linux but has been developed with a truly platform independent implementation in mind.

Book
01 Apr 2002
TL;DR: This compact and comprehensive book systematically unveils what resolute users of the new Windows XP operating system will find interesting and useful, with little-known details, utility programs, and configuration settings all captured in a consistent reference format.
Abstract: From the Publisher: This compact and comprehensive book systematically unveils what resolute users of the new Windows XP operating system will find interesting and useful, with little-known details, utility programs, and configuration settings all captured in a consistent reference format. A hands-on guide, Windows XP in a Nutshell cuts through the hype and gives practical details you can use every day. It's written by David A. Karp, the best-selling author whose no-nonsense “Annoyances” books and web site (Annoyances.org) have helped thousands of users solve problems and improve their experience with Windows®. The co-author is none other than Tim O'Reilly, founder of O'Reilly & Associates, whose books have revolutionized computer book publishing with their commonsense approach and depth of detail. At the heart of the book is a 200-plus-page reference section titled "Windows XP Applications and Tools," containing: Detailed information on most of the commands and utilities available with Windows XP, including Start Menu accessories, command prompt tools, hidden system administration utilities such as the Registry Editor, Microsoft Management Console, and TweakUI. A comprehensive "Where to Find It?" section designed to give Windows 9x/Me and Windows NT/2000 users a guide to the XP counterparts to previously familiar features, plus information on installing and upgrading. The Task and Setting Index, which provides users with quick access to locations of the hundreds of settings in Windows XP, organized alphabetically. A complete reference to the command prompt— not only covering the basics of the commandline and the different ways to use it, but also the advanced commands and scripting features at Windows XP's disposal. Packed with numerous tips and tricks, while warning of potential pitfalls, Windows XP in a Nutshell enables anyone to get the most out of all the resources available in XP.

Journal ArticleDOI
TL;DR: A computer program ‘XnWlup’ with user-friendly graphical interface is developed to help the users of WIMS-D library to enable quick visualization of the plots of the energy dependence of the multigroup cross sections of any nuclide of interest.

Book
15 Jan 2002
TL;DR: This book provides a thorough explanation of the underlying concepts behind these types of filesystems and gives complete, hands-on instructions for building, installing, using, and administering journaling and distributed filesystems on computers running Linux.
Abstract: From the Publisher: High-performance, high-availability journaling and distributed filesystems are one of the most exciting areas of Linux today. This book provides a thorough explanation of the underlying concepts behind these types of filesystems and gives complete, hands-on instructions for building, installing, using, and administering journaling and distributed filesystems on computers running Linux. Beyond simply discussing advanced filesystems on Linux, this book also explains how to install interoperability software that lets Linux systems share data with networked Apple Macintosh, Microsoft Windows, and Novell NetWare systems. It also includes procedural, hands-on information on related technologies such as Logical Volume Management and networked backup systems, and discusses how to use all of these to maximize the power, flexibility, and viability of Linux in enterprise computing environments.

Book
16 Nov 2002
TL;DR: The Tablet PC Quick Reference offers detailed guidance on pen input, configuring options, different operating modes, data management, the technology and philosophy behind digital ink, using Windows Journal, integration with Microsoft Office, using the Tablet PC on the road, connecting to the wireless Web, and other capabilities of the new device.
Abstract: From the Publisher: Tablet PC Quick Reference helps anyone get up and running right away on the new Tablet PC. It succinctly describes the cool new capabilities of the Tablet PC device and the Microsoft(r) Windows(r) XP Tablet PC Edition operating system-including amazing mobility and customizability, an intuitive pen-based interface, advanced handwriting-recognition technology, the Microsoft Windows Journal note-taking utility, and more. Then it shows how to take full advantage of those features quickly and easily. It offers detailed guidance on pen input, configuring options, different operating modes, data management, the technology and philosophy behind digital ink, using Windows Journal, integration with Microsoft Office, using the Tablet PC on the road, connecting to the wireless Web, and other capabilities of the new device.


Journal Article
TL;DR: ProCite and Reference Manager can be used apart from a word processing application to search the Z39.50 databases, to search for references within a bibliographic file, or to generate a bibliography, and have the capability to integrate themselves into Microsoft Word or WordPerfect via their Cite While You Write (CWYW) function.
Abstract: ProCite 5.0. 2141 Palomar Airport Rd., Ste. 350 Carlsbad, CA 92009 1-800-722-1227 info@isiresearchsoft.com Price: Full retail version $395.95, students $109.95, single-use upgrade $99.95. System requirements: Microsoft Windows 95/98/NT4/2000/XP. Word processor compatibility: Microsoft Word for Windows 7, 97, 2000; Corel WordPerfect 7, 8, 9. Macintosh version system requirements: PowerPC/Mac with Macintosh operating system or compatible (120MHz recommended); Apple MacOS System 7.5.5 or later. Reference Manager 9.5 2141 Palomar Airport Rd., Ste. 350 Carlsbad, CA 92009 1-800-722-1227 info@isiresearchsoft.com Price: Full retail version 5395.95, students $109.95, single-use upgrade $99.95 System requirements: Microsoft Windows 98/ME/XP/NT4/2000. Word processor compatibility: Microsoft Word for Windows; XP, 2000, 97 and 7; Corel WordPerfect 8, 2000, 2002. Anyone who has ever published a scholarly book or paper knows that the most tedious aspect is generating the bibliography. Nor is any task associated with this so prone to avoidable error. ISI ResearchSoft has made this task a little less tedious with its suite of bibliographic management products. Bibliographic management software eliminates the need for writing citations on file cards for later use. Citations can be entered into the data-base manually; they often can be imported from a database on the Internet. Once the citations are in the bibliographic reference manager file, they can be retrieved by a variety of means and used for articles, books, and any other publication requiring a bibliography or citations. The reference manager software automatically reformats the citations according to any one of the hundreds of predefined output styles, which vary from journal to journal. Two of these products, Reference Manager and ProCite, are reviewed here. Endnote was reviewed in the December 2000 issue of ITAL, but an updated version was recently released, and the differences between versions are addressed in these pages as well. ProCite and Reference Manager can be used apart from a word processing application to search the Z39.50 databases, to search for references within a bibliographic file, or to generate a bibliography. Conversely, they have the capability to integrate themselves into Microsoft Word or WordPerfect via their Cite While You Write (CWYW) function. This allows the author to format citations and generate a bibliography with a few simple commands. Installation on a Windows NT 4.0 machine running Microsoft Office 2000 was quick and straightforward. ProCite and Reference Manager both integrated seamlessly as add-ins with Word during installation and should do so with WordPerfect. Installation results in a new toolbar as well as a new pull-down menu item for Word. When you install either of these products, the installation software determines which versions of Word or WordPerfect are available and installs the CWYW function automatically. However, if Word or WordPerfect is installed after installing either of these products, the CWYW setup must be run for the function to appear in the word processor's Tools menu. ProCite has a Macintosh version available, while Reference Manager only exists in a Windows version. The look and feel of both products is nearly identical. In fact, the toolbar is identical and only slight differences exist in the pull down menus. Of course, this means that they have many functions in common as well. Each can search Internet databases, organize references, and format bibliographies. A bibliographic file created by ProCite, Reference Manager, or EndNote can be easily converted to a form usable by any other of those three applications. A primary function of a bibliographic manager is to create, manipulate, and format bibliographic references. This is a formidable task when the number of bibliographic references in a scholarly work can number in the hundreds or even thousands. …