NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 11 results Save | Export
Hassler, Carol – Computers in Libraries, 2012
When staff at the Wisconsin State Law Library began compiling a wish list for a new website, the topic of a new domain name came up almost immediately. Their old website was located at http://wsll.state.wi.us. Spelling that relatively complex domain over the phone day after day provided the impetus to explore other options. Whatever domain name…
Descriptors: Search Engines, Computer System Design, Design Preferences, Guidelines
Peer reviewed Peer reviewed
Direct linkDirect link
Miller, L. D.; Soh, Leen-Kiat; Samal, Ashok; Nugent, Gwen – International Journal of Artificial Intelligence in Education, 2012
Learning objects (LOs) are digital or non-digital entities used for learning, education or training commonly stored in repositories searchable by their associated metadata. Unfortunately, based on the current standards, such metadata is often missing or incorrectly entered making search difficult or impossible. In this paper, we investigate…
Descriptors: Computer Science Education, Metadata, Internet, Artificial Intelligence
Peer reviewed Peer reviewed
Direct linkDirect link
Encelle, Benoit; Baptiste-Jessel, Nadine; Sedes, Florence – Journal of Access Services, 2009
Personalization of user interfaces for browsing content is a key concept to ensure content accessibility. In this direction, we introduce concepts that result in the generation of personalized multimodal user interfaces for browsing XML content. User requirements concerning the browsing of a specific content type can be specified by means of…
Descriptors: Design Preferences, User Needs (Information), Metadata, Programming Languages
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Song, Sang Chul – ProQuest LLC, 2010
An unprecedented amount of information encompassing almost every facet of human activities across the world is generated daily in the form of zeros and ones, and that is often the only form in which such information is recorded. A good fraction of this information needs to be preserved for periods of time ranging from a few years to centuries.…
Descriptors: Information Needs, Information Sources, Indexing, Access to Information
Peer reviewed Peer reviewed
Sutton, Stuart A. – Journal of the American Society for Information Science, 1999
Describes the conceptual foundations for the Gateway to Educational Materials (GEM) metadata framework including adoption of the Dublin Core Element Set as its base referent, and extension of that set to meet the needs of the domain. Discusses selection and structuring of the units of description. Examines metadata generation, the association of…
Descriptors: Access to Information, Computer System Design, Educational Resources, Information Services
Peer reviewed Peer reviewed
Cortez, Edwin M. – Journal of the American Society for Information Science, 1999
Introduces a prototype system for devising and using a metadata vocabulary for data retrieval, based on a project at the United States Department of Agriculture. A unified information-access system called REEIS (Research, Education, Economics, Extension Information System) is being designed to provide a knowledge base of programs, projects, and…
Descriptors: Access to Information, Computer System Design, Data Collection, Electronic Text
Doan, Bich-Lien; Beigbeder, Michel; Girardot, Jean-Jacques; Jaillon, Philippe – 1998
The growing volume of heterogeneous and distributed information on the World Wide Web has made it increasingly difficult for existing tools to retrieve relevant information. To improve the performance of these tools, this paper suggests how to handle two aspects of the problem. The first aspect concerns a better representation and description of…
Descriptors: Access to Information, Artificial Intelligence, Computer System Design, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Henze, Nicola; Dolog, Peter; Nejdl, Wolfgang – Educational Technology & Society, 2004
The challenge of the semantic web is the provision of distributed information with well-defined meaning, understandable for different parties. Particularly, applications should be able to provide individually optimized access to information by taking the individual needs and requirements of the users into account. In this paper we propose a…
Descriptors: Access to Information, Metadata, Internet, Educational Resources
Peer reviewed Peer reviewed
Sprehe, J. Timothy – Government Information Quarterly, 1997
The United States Bureau of the Census is making the Internet and other electronic systems the primary sources for its statistics and is actively seeking user feedback on its systems design activities. Discusses the design principles of the Data Access and Dissemination System (DADS) and policy issues of pricing/cost recovery, partnerships, and…
Descriptors: Access to Information, Computer System Design, Costs, Databases
Ahanger, G.; Little, T. D. C. – 1997
The accessibility of the World Wide Web and its flexibility for conveying digital information in various forms makes it a convenient mode of communication for education. With the help of a distance learning application called "Easy Ed," this paper demonstrates how these properties of the Web along with a data model can be used to provide…
Descriptors: Access to Information, Authoring Aids (Programming), Computer Assisted Instruction, Computer Mediated Communication