MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
D-Lib
Jan/Feb 2010
Reilly & Tupelo-Schneck
Digital Object Repository Server: A Component of the Digital Object Architecture This paper introduces the Digital Object Repository Server, the most recent instantiation of the Corporation for National Research Initiatives' repository work. mark for My Articles similar articles
D-Lib
June 2001
John S. Erickson
A Digital Object Approach to Interoperable Rights Management Fine-grained policy enforcement enabled by a digital object infrastructure... mark for My Articles similar articles
D-Lib
April 2001
John S. Erickson
Information Objects and Rights Management: A Mediation-based Approach to DRM Interoperability Although the central focus of this article is to confront current information-opaque approaches to digital rights management, I hope the principles presented here are broader in scope and will suggest solutions elsewhere... mark for My Articles similar articles
D-Lib
June 2005
Jantz & Giarlo
Digital Preservation: Architecture and Technology for Trusted Digital Repositories To ensure that current digital archives can be trusted to be available in the future, methods, practices, and standards need to be defined. mark for My Articles similar articles
D-Lib
October 2006
An Interoperable Fabric for Scholarly Value Chains It is possible to build scholarly value chains across heterogeneous, distributed repositories. It is also possible to record audit trails of scholarly value chains into the very foundation of the scholarly communication system. mark for My Articles similar articles
D-Lib
February 2006
ADL-R: The First Instance of a CORDRA Registry The goal of the CORDRA project is to create a global infrastructure for the federation of content repositories. mark for My Articles similar articles
D-Lib
August 2006
Robert Tansley
Building a Distributed, Standards-based Repository Federation: The China Digital Museum Project This article presents the architecture developed for the China Digital Museum Project, a collaborative project involving the Chinese Ministry of Education, Hewlett-Packard Company and several Chinese universities, with Beihang University as the main technical partner. mark for My Articles similar articles
D-Lib
May/Jun 2007
Saidis & Delis
Type-consistent Digital Objects This article provides an overview of the Digital Object Prototype framework and highlights its type-conformance capabilities and shows how heterogeneous digital material can be treated in a uniform manner without resorting to custom developments. mark for My Articles similar articles
D-Lib
April 2003
Staples et al.
The Fedora Project An Open-source Digital Object Repository Management System mark for My Articles similar articles
JavaWorld
March 2001
Brian Goetz
Design for performance, Part 3: Remote interfaces Many common Java performance problems stem from class design decisions made early in the design process, long before most developers even start thinking about performance. This article examines performance issues specific to remote applications... mark for My Articles similar articles
D-Lib
Sep/Oct 2012
Vermaaten et al.
Identifying Threats to Successful Digital Preservation: the SPOT Model for Risk Assessment Digital preservation strategies, as well as the processes and tools that implement those strategies, are designed to secure the long-term future of digital materials. A successful digital preservation strategy must account for and mitigate the impact of various threats. mark for My Articles similar articles
D-Lib
Nov/Dec 2010
Massart et al.
Taming the Metadata Beast: ILOX Information for Learning Object eXchange, is developed as part of the IMS Learning Object Discovery & Exchange specification specification that aims to facilitate the discovery and retrieval of learning objects stored across more than one collection. mark for My Articles similar articles
D-Lib
Nov/Dec 2012
Joan E. Beaudoin
Context and Its Role in the Digital Preservation of Cultural Objects In discussions surrounding digital preservation, context -- those properties of an object related to its creation and preservation that make the object's origins, composition, and purpose clear -- has been identified as a critical aspect of preservation metadata. mark for My Articles similar articles
D-Lib
December 2007
Andrew Waugh
The Design and Implementation of an Ingest Function to a Digital Archive During the design and implementation of public record digital archive, considerable attention was paid to the ingest function that accessions digital objects into the archive. In this article the design of the ingest function, and the lessons learned about ingest are described. mark for My Articles similar articles
D-Lib
August 2003
Gladney & Bennett
What Do We Mean by Authentic? What's the Real McCoy? Authenticity is among digital document security properties needing attention. Literature focused on preservation reveals uncertainty -- even confusion -- about what we might mean by authentic. This article provides a solid, useful definition that spans vernacular usage of "authentic." mark for My Articles similar articles
D-Lib
Jul/Aug 2000
Thornton Staples & Ross Wayland
Virginia Dons FEDORA: A Prototype for a Digital Object Repository After shopping for a digital library system unsuccessfully, in 1999 we created a digital library research and development group and set about creating the system that we need. mark for My Articles similar articles
D-Lib
January 2003
Norman Paskin
On Making and Identifying a "Copy" The purpose of this article is to explore some of the conceptual issues of "making a copy" digitally and in an automated DRM environment which need to be clarified to enable rights expression languages and other DRM tools to deal with the concept of copying. mark for My Articles similar articles
D-Lib
Mar/Apr 2008
Pearce et al.
The Australian METS Profile - A Journey about Metadata Steps toward a generic Australian METS profile that can be used across multiple domains and usage scenarios. mark for My Articles similar articles
JavaWorld
November 2000
Todd Sundsted
Signed and sealed objects deliver secure serialized content The Java serialization mechanism does not protect the serialized content, and thus introduces the possibility of security flaws in applications using serialization. Two classes are designed to protect the contents of serialized objects from manipulation and examination... mark for My Articles similar articles
D-Lib
February 2001
Manfred Thaller
From the Digitized to the Digital Library Many, if not most, digitization projects have aimed at existing collections as individual servers. A digital library, however, should be more than a digitized one... mark for My Articles similar articles
D-Lib
Nov/Dec 2012
Joan Beaudoin
A Framework for Contextual Metadata Used in the Digital Preservation of Cultural Objects Contextual information is fundamental to understanding many aspects about digital content. The framework presented here was developed to accommodate recording this critical information. mark for My Articles similar articles
JavaWorld
November 2001
Kurt Jacobs
Subscribe now for rapid prototyping Developers often find themselves reengineering an API to meet the demand of evolving requirements. By providing a framework for a more flexible system, the Publisher-Subscriber pattern can help you overcome some problems associated with object dependencies... mark for My Articles similar articles
D-Lib
April 2000
Moore, Baru, Rajasekar, Ludaescher, et al.
Collection-Based Persistent Digital Archives - Part 2 A discussion of the four major components of a persistent archive system: support for ingestion, archival storage, information discovery, and presentation of the collection. Includes a description of a one million message persistent E-mail collection. mark for My Articles similar articles
D-Lib
March 2005
Theo van Veen
Renewing the Information Infrastructure of the Koninklijke Bibliotheek The Koninklijke Bibliotheek (KB) is engaged in a major renewal of its information infrastructure. mark for My Articles similar articles
D-Lib
June 2009
Mestl et al.
Time Challenges - Challenging Times for Future Information Search It is hard to predict what the major challenge in search will be 100 years from now. mark for My Articles similar articles
JavaWorld
April 2001
Geoff Friesen
Object-oriented language basics, Part 1 An introduction to object-oriented programming and how to declare classes and create objects from those classes... mark for My Articles similar articles
JavaWorld
April 2001
Kelly Davis & Robert Di Marco
Manage distributed sessions Using RMI and the Proxy API introduced in JDK 1.3, this article describes a technique that allows one or more servlet servers to maintain session information on one or more session servers. By adopting this architecture, no single point of failure will exist for session management... mark for My Articles similar articles
JavaWorld
September 2002
Tarak Modi
J2SE 1.4 breathes new life into the CORBA community, Part 2 The Portable Object Adapter (POA), introduced in CORBA 2.2, replaced CORBA's Basic Object Adapter (BOA). An object adapter represents a core piece of the CORBA runtime on the server. This article explore J2SE 1.4's POA support. mark for My Articles similar articles
D-Lib
February 2009
Nicholas et al.
A Policy Checklist for Enabling Persistence of Identifiers One of the main tasks of the Persistent Identifier Linking Infrastructure (PILIN) project on persistent identifiers was to establish a policy framework for managing identifiers and identifier providers. mark for My Articles similar articles
JavaWorld
April 2001
Piet Jonas
Secure type-safe collections A framework that overcomes the standard Java Collections Framework's main problem: its containers lack the ability to restrict themselves to storing objects of a specific type. The solution uses reflection, wrapper classes, and a collection of static factory methods... mark for My Articles similar articles
JavaWorld
December 2001
Jeff Friesen
Trash talk, Part 1 One feature that distinguishes Java from other computer languages is its garbage collection abilities. In this article, This article introduces garbage collection and shows how Java's optional support for it affects your programs... mark for My Articles similar articles
JavaWorld
May 2001
Markus Dorn
Reading objects is easy with SAX By following some simple rules when mapping objects to XML, you can easily read object structures, even complex ones, from XML. See how you can use SAX to eliminate that complexity... mark for My Articles similar articles
JavaWorld
July 2000
Todd M. Greanier
Flatten your objects The Java Serialization API is used by many other Java APIs (like RMI and JavaBeans) to persist objects beyond the duration of a running virtual machine. This article tries to demystify the secrets of the Java Serialization API. mark for My Articles similar articles
JavaWorld
October 2000
Frank Sommers
Activatable Jini services, Part 2: Patterns of use This article concentrates on the consequences of activation in the Jini context. Sommers exponds on the issue of deactivating objects, then considers the implications of deactivation for well-designed Jini services and how the Jini helper services introduced in the 1.1 beta version of the JSK can contribute... mark for My Articles similar articles
D-Lib
Jul/Aug 2012
Patton et al.
Identification of User Facility Related Publications One metric for evaluating the scientific value or impact of a facility is the number of publications by users as a direct result of using that facility. mark for My Articles similar articles
JavaWorld
March 2002
James Carman
Write once, persist anywhere Most J2EE applications strive to abstract the database tier by employing the Data Access Object design pattern. This article shows you a DAO pattern framework that you can reuse on all your projects, regardless of object type... mark for My Articles similar articles
JavaWorld
November 2000
M. Jeff Wilson
Get smart with proxies and RMI RMI enables developers to either get a remote reference to a distributed object, in which all method calls are forwarded to the server object, or get a copy of the remote object and invoke on it locally. You can combine these approaches in a way that is transparent to the client code... mark for My Articles similar articles
Technology Research News
September 5, 2005
Finding Information on the 'Net Although the reach of today's search engines seems impressive, collectively they have indexed only about half of all publicly available Web pages. Here are ways to garner more information from the Web. mark for My Articles similar articles
Information Today
February 13, 2013
George H. Pike
Amazon Patents Electronic Marketplace For 'Used' Digital Content Will individuals soon be able to buy and sell "used" digital media such as apps, ebooks, and music downloads? And if so, will they only be able to do this through Amazon? mark for My Articles similar articles
JavaWorld
May 2002
Ryan Daigle
Eliminate JDBC overhead Most J2EE and other types of Java applications interact in some way with information persisted in a database. Interfacing with that database involves several iterations of SQL statements, connection management, transaction lifecycles, result processing, and exception handling. The many parts of this ritualistic dance are common in all contexts; however, this replication doesn't have to exist. This article outlines a flexible framework that remedies the repetition of interacting with a JDBC-compliant database. mark for My Articles similar articles
D-Lib
May/Jun 2012
Andras Holl
Information Bulletin on Variable Stars -- Rich Content and Novel Services for an Enhanced Publication Technically skilled authors, freely available bibliographic services and discipline-wide standardization -- all characteristic of astronomy -- form the foundation on which this uniquely enhanced journal is built, enabling it to provide quality services to its research community. mark for My Articles similar articles
JavaWorld
June 2002
Dirk Laessig
Score big with JSR 77, the J2EE Management Specification The specification's core is based on the model of managed objects, explained in this article. JSR 77 also defines an Enterprise JavaBeans (EJB) component for easily accessing these managed objects. mark for My Articles similar articles
JavaWorld
September 2000
Frank Sommers
Activatable Jini services, Part 1: Implement RMI activation Jini services must be long-lived and resilient, and must efficiently manage their computational resources with little user intervention. This article shows how to use RMI activation to manage computational resources and increase the availability of Jini services... mark for My Articles similar articles
JavaWorld
January 2002
Jeff Friesen
Trash talk, Part 2 This article explores the Reference Objects API, an API that allows your programs to interact with the garbage collector in limited ways... mark for My Articles similar articles
JavaWorld
October 2000
Bruce Eckel
Everything is an object, Part 2 Eckel takes you through name visibility and using components from other libraries; the static keyword; and comments and embedded documentation. By the end, you should be able to build your first Java program... mark for My Articles similar articles
JavaWorld
September 2001
Jian Zhong
Step into the J2EE architecture and process By reading this article, you will better understand many important J2EE architecture topics, and be able to apply that knowledge to extend and modify this simple methodology to solve your special business problems... mark for My Articles similar articles
JavaWorld
July 18, 2003
James Carman
Get down to business In this article, you will learn how to structure your applications such that modifications to the business object implementation do not require changes to the user interface using a simple framework for accessing your business objects. mark for My Articles similar articles
T.H.E. Journal
August 2001
Angel Rodriguez
The Virtual Reality Skeleton Project The objective of this project is to provide a flexible, interactive teaching tool for a human anatomy and physiology lecture and lab... mark for My Articles similar articles
Technology Research News
February 25, 2004
Scans pick up object orientation Researchers in Spain have improved the process of pattern recognition with a method of mapping three-dimensional objects in a way that records every possible point of view of the object. The method could be used to inspect the orientation and shapes of manufactured goods, and also for face recognition. mark for My Articles similar articles
JavaWorld
August 2001
Michael L. Perry
Automate dependency tracking, Part 1 Interactive applications are typically subdivided into information model and user interface subsystems. Automatic dependency tracking can discover dependencies within the system and keep the user interface current... mark for My Articles similar articles