BEYOND E-LIB: How does e-lib fit into the wider context of Electronic lnformation Research?
نویسندگان
چکیده
منابع مشابه
Integration of SMT-LIB Support into Maple
The SC project arose out of the recognition that the Symbolic Computation and Satisfiability Checking communities mutually benefit from the sharing of results and techniques. An SMT solver can profit from the inclusion of computer algebra techniques in its theory solver, while a computer algebra system can profit from dispatching SAT or SMT queries which arise as sub-problems during computation...
متن کاملD-Lib Magazine
Current systems for exploring scholarly data exhibit a number of shortcomings in their ability to facilitate the identification of research trends and identify 'interesting' connections between researchers. To address these issues we have developed Rexplore, a novel system which combines statistics, human-computer interaction, and semantic technologies, to support knowledge-based exploration an...
متن کاملD-Lib Magazine
OpenAIRE is the European infrastructure for Open Access scholarly communication. It populates and provides access to a graph of objects relative to publications, datasets, people, organizations, projects, and funders aggregated from a variety of data sources, such as institutional repositories, data archives, journals, and CRIS systems. Thanks to infrastructure services, objects in the graph ar...
متن کاملDigital Lib Cover final
This paper presents an expert evaluation of a collaborative annotation system named DiLAS (Digital Library Annotation Service). It can be globally accessed by individuals as well as different user communities, and knowledge is created and shared within English-speaking communities. It contains a collection of textual documents on information science and software science, and it gives access to ...
متن کاملHow to fit cryptographic e-voting into smart cards
The complexity of voting procedures make it challenging to design a secure electronic voting system. In many proposals, the security of the system relies mainly on a black box voting machine. Meanwhile, the most advanced proposals base their security arguments on (complicated) cryptographic protocols, e.g. blind signatures or homomorphic schemes. Canard and Traoré proposed cryptographic primiti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Library and Information Research
سال: 2015
ISSN: 1756-1086,0141-6561
DOI: 10.29173/lirg664