Context and Structure in Automated Full-Text Information Access
نویسندگان
چکیده
Context and Structure in Automated Full-Text Information Access
منابع مشابه
Context and Structured in Automated Full-Text Information Access
Context and Structure in Automated Full-Text Information Access
متن کاملAccessing Full Text of Articles: A Study on the Status of Medical Universities in Tehran
Introduction. Due to the rapid development of information technology and world wide web, there is easy and fast access to medical information and medical journals. Although there is free and easy access to articles' abstracts through Medline on the internet, accessing full text articles still remains a problem. This study was carried out to investigate the best way we could access full text of ...
متن کاملContext-Aware Recommender Systems: A Review of the Structure Research
Recommender systems are a branch of retrieval systems and information matching, which through identifying the interests and requires of the user, help the users achieve the desired information or service through a massive selection of choices. In recent years, the recommender systems apply describing information in the terms of the user, such as location, time, and task, in order to produce re...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کامل