5 resultados para special libraries

em Boston University Digital Common


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The future of theology libraries is far from clear. Since the nineteenth century, theology libraries have evolved to support the work of theological education. This article briefly reviews the development of theology libraries in North America and examines the contextual changes impacting theology libraries today. Three significant factors that will shape theology libraries in the coming decade are collaborative models of pedagogy and scholarship, globalization and rapid changes in information technology, and changes in the nature of scholarly publishing including the digitization of information. A large body of research is available to assist those responsible for guiding the direction of theology libraries in the next decade, but there are significant gaps in what we know about the impact of technology on how people use information that must be filled in order to provide a solid foundation for planning.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The resolution passed by the BU University Council approving an initiative to establish an archive of the research and scholarship produced by the faculty of the University.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper focuses on an efficient user-level method for the deployment of application-specific extensions, using commodity operating systems and hardware. A sandboxing technique is described that supports multiple extensions within a shared virtual address space. Applications can register sandboxed code with the system, so that it may be executed in the context of any process. Such code may be used to implement generic routines and handlers for a class of applications, or system service extensions that complement the functionality of the core kernel. Using our approach, application-specific extensions can be written like conventional user-level code, utilizing libraries and system calls, with the advantage that they may be executed without the traditional costs of scheduling and context-switching between process-level protection domains. No special hardware support such as segmentation or tagged translation look-aside buffers (TLBs) is required. Instead, our ``user-level sandboxing'' mechanism requires only paged-based virtual memory support, given that sandboxed extensions are either written by a trusted source or are guaranteed to be memory-safe (e.g., using type-safe languages). Using a fast method of upcalls, we show how our mechanism provides significant performance improvements over traditional methods of invoking user-level services. As an application of our approach, we have implemented a user-level network subsystem that avoids data copying via the kernel and, in many cases, yields far greater network throughput than kernel-level approaches.