996 resultados para Library extension
Resumo:
There is considerable interest internationally in developing product libraries to support the use of BIM. Product library initiatives are driven by national bodies, manufacturers and private companies who see their potential. A major issue with the production and distribution of product information for BIM is that separate library objects need to be produced for all of the different software systems that are going to use the library. This increases the cost of populating product libraries and also increases the difficulty in maintaining consistency between the representations for the different software over time. This paper describes a project which uses “software transformation” technology from the field of software engineering to support the definition of a single generic representation of a product which can then be automatically converted to the format required by receiving software. The paper covers the current state of implementation of the product library, the technology underlying the transformations for the currently supported software and the business model for creating a national library in Australia. This is placed within the context of other current product library systems to highlight the differences. The responsibilities of the various actors involved in supporting the product library are also discussed.
Resumo:
Public libraries are increasingly using social media in an attempt to meet users in their own spaces. Social media can be useful when used to create a participatory library service – to engage with users. However, there has been little empirical investigation into the success of social media use by public libraries. This article reports on the findings of a research project that explored the use of social media by Australian public libraries. Two organisations participated in case studies that involved interviews, document analysis, and social media observation. To contextualise the use of social media in the case study organisations, a sub study was undertaking involving observation of an additional 24 public libraries across Australia. This article focuses on the findings from the observation sub study. It presents and applies a methodology for classifying social media content to determine whether the sample libraries’ social media use is indicative of a participatory approach to service delivery. This article explores how a range of social media platforms are used by the sample libraries and considers what ‘best practice’ in participatory library service looks like. The two case study organisations’ use of social media is highlighted as exemplary practice.
Resumo:
In this paper we examine the combined extension and torsion of a compressible isotropic elastic cylinder of finite extent. The equilibrium equations are formulated in terms of the principal stretches and then applied to the special case of pure torsion superimposed on a uniform extension (an isochoric deformation). Explicit necessary and sufficient conditions on the strain-energy function for the material to support this deformation with vanishing traction on the lateral surfaces of the cylinder are obtained. Some strain-energy functions satisfying these conditions are considered, existing results are recovered as special cases and new results are obtained. We also point out how the strain-energy functions generated from the considered isochoric deformation considered (of a compressible material) can be used to generate energy functions and corresponding solutions for the incompressible theory.
Efficient extension of standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures
Resumo:
Universal Designated-Verifier Signature (UDVS) schemes are digital signature schemes with additional functionality which allows any holder of a signature to designate the signature to any desired designated-verifier such that the designated-verifier can verify that the message was signed by the signer, but is unable to convince anyone else of this fact. Since UDVS schemes reduce to standard signatures when no verifier designation is performed, it is natural to ask how to extend the classical Schnorr or RSA signature schemes into UDVS schemes, so that the existing key generation and signing implementation infrastructure for these schemes can be used without modification. We show how this can be efficiently achieved, and provide proofs of security for our schemes in the random oracle model.
Resumo:
The literature around Library 2.0 remains largely theoretical with few empirically studies and is particularly limited in developing countries such as Indonesia. This study addresses this gap and aims to provide information about the current state of knowledge on Indonesian LIS professionals’ understanding of Library 2.0. The researchers used qualitative and quantitative approaches for this study, asking thirteen closed- and open-ended questions in an online survey. The researchers used descriptive and in vivo coding to analyze the responses. Through their analysis, they identified three themes: technology, interactivity, and awareness of Library 2.0. Respondents demonstrated awareness of Library 2.0 and a basic understanding of the roles of interactivity and technology in libraries. However, overreliance on technology used in libraries to conceptualize Library 2.0 without an emphasis on its core characteristics and principles could lead to the misalignment of limited resources. The study results will potentially strengthen the research base for Library 2.0 practice, as well as inform LIS curriculum in Indonesia so as to develop practitioners who are able to adapt to users’ changing needs and expectations. It is expected that the preliminary data of this study could be used to design a much larger and more complex future research project in this area.
Resumo:
We consider the following problem: a user stores encrypted documents on an untrusted server, and wishes to retrieve all documents containing some keywords without any loss of data confidentiality. Conjunctive keyword searches on encrypted data have been studied by numerous researchers over the past few years, and all existing schemes use keyword fields as compulsory information. This however is impractical for many applications. In this paper, we propose a scheme of keyword field-free conjunctive keyword searches on encrypted data, which affirmatively answers an open problem asked by Golle et al. at ACNS 2004. Furthermore, the proposed scheme is extended to the dynamic group setting. Security analysis of our constructions is given in the paper.
Resumo:
Although they sit outside the formal education sector, libraries are intrinsically centres of learning where people can engage with knowledge and ideas and acquire the literacy skills that are essential for active participation in an increasingly digital society. In Australia, National and State Libraries Australasia (NSLA) has acknowledged the need to not only better understand the general concept of the library as a learning institution, but also to help the individual NSLA libraries specifically identify their capabilities in this arena. The NSLA Literacy and Learning project aimed to improve the members' organisational comprehension and practice as learning institutions and to help them conceptualise their ability to deliver literacy and learning programmes that will benefit their staff and their communities. The NSLA concept of learning institution encompassed two discrete lenses: the internal lens of the library's own organisational understanding and practice, and the external lens of the clients who engage in the literacy and learning programmes delivered by the library. The ultimate goal was to develop a matrix which could enable libraries to assess their perceived levels of maturity as learning institutions along a continuum of emerging to active capabilities. The matrix should also serve as a tool for shared understanding about the NSLA's own strategic directions in the literacy and learning space. This case study documents the evolving process of developing a learning institution maturity framework for libraries that considers individual, team and organisational learning, as well as clients' interactions with the organisation, with the goal of producing a framework that has the potential to measure the value of learning and growth in both the library's staff and the library's communities
Resumo:
This study determined factors which influenced Canadian provincial (state) politicians when making funding decisions for public libraries. Using the case study methodology, Canadian provincial/state-level funding for public libraries in the 2009-2010 fiscal year was examined. The data were analyzed to determine whether Cialdini’s theory of influence and specifically any of the six tactics of influence (i.e., commitment and consistency, authority, liking, social proof, scarcity, and reciprocity) were instrumental in these budgetary decision-making processes. Findings show the principles of “authority,” “consistency and commitment,” and “liking” were relevant, and that “liking” was especially important to these decisions.
Resumo:
Notwithstanding the interest over many years by scholars in modeling the internationalization of the firm, the initial transition for the firm from domestic to international operations remains under-researched. We identify the behavioral factors that are important at the pre-internationalization state and discuss how they may interrelate to influence a decision to commit to internationalization through export commencement. We study export commitment by proposing and constructing an index that incorporates the factors that influence a firm’s propensity to commit to export activities. Utilizing the items from this index in a logistic regression analysis, we distinguish between the pre-internationalization characteristics of exporting and non-exporting firms to better understand the key influences in export commitment. Implications are discussed.
Resumo:
Citizen science projects have demonstrated the advantages of people with limited relevant prior knowledge participating in research. However, there is a difference between engaging the general public in a scientific project and entering an established expert community to conduct research. This paper describes our ongoing acoustic biodiversity monitoring collaborations with the bird watching community. We report on findings gathered over six years from participation in bird walks, observing conservation efforts, and records of personal activities of experienced birders. We offer an empirical study into extending existing protocols through in-context collaborative design involving scientists and domain experts.
Resumo:
Introduction This research is the first to investigate the experiences of teacher-librarians as evidence-based practice. An empirically derived model is presented in this paper. Method This qualitative study utilised the expanded critical incident approach, and investigated the real-life experiences of fifteen Australian teacher-librarians, through semi-structured interviews and inductive data analysis. Data collection utilised semi-structured interviews, on-site observations, journaling and the rubric for contextual information. These approaches allowed each of the interviewees to tell their own story and provided richness to the data. Analysis The analysis involved two types of data categorisation: binary and thematic. Binary classification was used to identify factual details. Thematic analysis involved categorising the emerging themes. Results An empirically derived model for evidence-based practice was devised and associated critical findings identified. The results demonstrate that evidence-based practice for teacher-librarians is a holistic practice. It is not a linear, step-by-step process. Conclusions This study is significant for teacher-librarians and library and information professionals as it provides new understanding of evidence-based practice.
Resumo:
Secure protocols for password-based user authentication are well-studied in the cryptographic literature but have failed to see wide-spread adoption on the Internet; most proposals to date require extensive modifications to the Transport Layer Security (TLS) protocol, making deployment challenging. Recently, a few modular designs have been proposed in which a cryptographically secure password-based mutual authentication protocol is run inside a confidential (but not necessarily authenticated) channel such as TLS; the password protocol is bound to the established channel to prevent active attacks. Such protocols are useful in practice for a variety of reasons: security no longer relies on users' ability to validate server certificates and can potentially be implemented with no modifications to the secure channel protocol library. We provide a systematic study of such authentication protocols. Building on recent advances in modelling TLS, we give a formal definition of the intended security goal, which we call password-authenticated and confidential channel establishment (PACCE). We show generically that combining a secure channel protocol, such as TLS, with a password authentication protocol, where the two protocols are bound together using either the transcript of the secure channel's handshake or the server's certificate, results in a secure PACCE protocol. Our prototype based on TLS is available as a cross-platform client-side Firefox browser extension and a server-side web application which can easily be installed on deployed web browsers and servers.
Resumo:
This research investigated the ways academic libraries are using social media and adopting participatory principles in their programs and services. Using the Grounded Theory method the research developed an empirically derived model for participatory libraries. The research revealed three core categories representing the participatory library: community, empowerment, and experience. The research provides library professionals, researchers and the library community, with a fresh perspective and holistic picture of the contemporary library. The findings can be used to guide the development of participatory libraries in Australia and internationally.