منابع مشابه
RDA Element Sets and RDA Value Vocabularies: Vocabularies for Resource Description in the Semantic Web
Considering the need for metadata standards suitable for the Semantic Web, this paper describes the RDA Element Sets and the RDA Value Vocabularies that were created from attributes and relationships defined in Resource Description and Access (RDA). First, we present the vocabularies included in RDA Element Sets: the vocabularies of classes, of properties and of properties unconstrained by FRBR...
متن کاملThe RDA concept: time for a change?
Fifty-one years ago, at the height of World War II, the National Research Council (NRC) published a six-page document entitled Recommended Dietary Allowances (RDAs). Since then, the nine successive editions of the RDAs have become nutrition's gold standard—the most authoritative guide to the nutrient needs of people in the United States, used for an extraordinary variety of purposes. The NRC's ...
متن کاملOnline Classification Using a Voted RDA Method
We propose a voted dual averaging method for online classification problems with explicit regularization. This method employs the update rule of the regularized dual averaging (RDA) method proposed by Xiao, but only on the subsequence of training examples where a classification error is made. We derive a bound on the number of mistakes made by this method on the training set, as well as its gen...
متن کاملBuilding a Platform for Rda Vocabularies
The management of vocabularies in the evolving linked data environment requires different tools and processes than libraries and other memory institutions have used in the past. The RDA Resource Description and Access standard has taken the lead in building tools and providing services as part of its RDA Registry development. The evolution of the current RDA Registry and the Open Metadata Regis...
متن کاملA RDA Framework against False Data Aggregates in CWSN
Sensor networks generate enormous amounts of redundant sensing data. Data aggregation techniques are required to gather and aggregate these sensor data, by which the aggregator nodes forward to the base station only the aggregate results. When a Cluster-based Wireless Sensor Network (CWSN) is deployed in an unattended environment, the sensor nodes and aggregators become highly vulnerable to var...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Theological Librarianship
سال: 2011
ISSN: 1937-8904
DOI: 10.31046/tl.v4i1.175