986 resultados para correctional services


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Urquhart,C., Spink, S., Thomas, R. & Weightman, A. (2007). Developing a toolkit for assessing the impact of health library services on patient care. Report to LKDN (Libraries and Knowledge Development Network). Aberystwyth: Department of Information Studies, Aberystwyth University. Sponsorship: Libraries and Knowledge Development Network/ NHS

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Rowley, J.& Urquhart, C. (2007). Understanding student information behavior in relation to electronic information services: lessons from longitudinal monitoring and evaluation Part 1. Journal of the American Society for Information Science and Technology, 58(8), 1162-1174. Sponsorship: JISC

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Urquhart, C. & Rowley, J. (2007). Understanding student information behavior in relation to electronic information services: lessons from longitudinal monitoring and evaluation Part 2. Journal of the American Society for Information Science and Technology, 58(8), 1188-1197. Sponsorship: JISC

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Thomas, R., Urquhart, C., Crossan, S. & Hines, B. (2008). MUES (Mid Wales - Users - Ethnic Services) Ethnic services provision 2007-08. Report for Libraries for Life: Delivering the entitlement agenda for library users in Wales 2007-09. Aberystwyth: Department of Information Studies, Aberystwyth University. Related policy guidance published separately Sponsorship: CyMAL

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Urquhart, C., Thomas, R., Crossan, S. & Hines, B. (2008). MUES (Mid Wales - Users - Ethnic Services) Ethnic services provision 2007-08. Policy guidance for Libraries for Life: Delivering the entitlement agenda for library users in Wales 2007-09. Aberystwyth: Department of Information Studies, Aberystwyth University. Relates to report of same title - http://hdl.handle.net/2160/609 Sponsorship: CyMAL

Relevância:

20.00% 20.00%

Publicador:

Resumo:

North, J., Lavallee, D., An investigation of potential users of career transition services in the United Kingdom, Psychology of Sport and Exercise, Vol. 5, No. 1. (January 2004), pp. 77-84. RAE2008

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Maddrell, John, 'What we have discovered about the Cold War is what we already knew: Julius Mader and Western Espionage during the Cold War', Cold War History (2005) 5(2) pp.235-258 RAE2008

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Memorial Sermon.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The sermon is in printed pamphlet form.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Various memorial addresses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A working paper written for Boston University Libraries to foster discussion about how to provide better support for BU faculty authors.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A working paper for discussion

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As new multi-party edge services are deployed on the Internet, application-layer protocols with complex communication models and event dependencies are increasingly being specified and adopted. To ensure that such protocols (and compositions thereof with existing protocols) do not result in undesirable behaviors (e.g., livelocks) there needs to be a methodology for the automated checking of the "safety" of these protocols. In this paper, we present ingredients of such a methodology. Specifically, we show how SPIN, a tool from the formal systems verification community, can be used to quickly identify problematic behaviors of application-layer protocols with non-trivial communication models—such as HTTP with the addition of the "100 Continue" mechanism. As a case study, we examine several versions of the specification for the Continue mechanism; our experiments mechanically uncovered multi-version interoperability problems, including some which motivated revisions of HTTP/1.1 and some which persist even with the current version of the protocol. One such problem resembles a classic degradation-of-service attack, but can arise between well-meaning peers. We also discuss how the methods we employ can be used to make explicit the requirements for hardening a protocol's implementation against potentially malicious peers, and for verifying an implementation's interoperability with the full range of allowable peer behaviors.