Digital Library Technologies: Complex Objects, Annotation, Ontologies, Classification, Extraction, and Security

Morgan & Claypool Publishers
Free sample

Digital libraries (DLs) have introduced new technologies, as well as leveraging, enhancing, and integrating related technologies, since the early 1990s. These efforts have been enriched through a formal approach, e.g., the 5S (Societies, Scenarios, Spaces, Structures, Streams) framework, which is discussed in two earlier volumes in this series. This volume should help advance work not only in DLs, but also in the WWW and other information systems. Drawing upon four (Kozievitch, Murthy, Park, Yang) completed and three (Elsherbiny, Farag, Srinivasan) in-process dissertations, as well as the efforts of collaborating researchers and scores of related publications, presentations, tutorials, and reports, this book should advance the DL field with regard to at least six key technologies. By integrating surveys of the state-of-the-art, new research, connections with formalization, case studies, and exercises/projects, this book can serve as a computing or information science textbook. It can support studies in cyber-security, document management, hypertext/hypermedia, IR, knowledge management, LIS, multimedia, and machine learning. Chapter 1, with a case study on fingerprint collections, focuses on complex (composite, compound) objects, connecting DL and related work on buckets, DCC, and OAI-ORE. Chapter 2, discussing annotations, as in hypertext/hypermedia, emphasizes parts of documents, including images as well as text, managing superimposed information. The SuperIDR system, and prototype efforts with Flickr, should motivate further development and standardization related to annotation, which would benefit all DL and WWW users. Chapter 3, on ontologies, explains how they help with browsing, query expansion, focused crawling, and classification. This chapter connects DLs with the Semantic Web, and uses CTRnet as an example. Chapter 4, on (hierarchical) classification, leverages LIS theory, as well as machine learning, and is important for DLs as well as the WWW. Chapter 5, on extraction from text, covers document segmentation, as well as how to construct a database from heterogeneous collections of references (from ETDs); i.e., converting strings to canonical forms. Chapter 6 surveys the security approaches used in information systems, and explains how those approaches can apply to digital libraries which are not fully open. Given this rich content, those interested in DLs will be able to find solutions to key problems, using the right technologies and methods. We hope this book will help show how formal approaches can enhance the development of suitable technologies and how they can be better integrated with DLs and other information systems.
Read more
Collapse

About the author

Edward A. Fox grew up on Long Island, New York. He attended the Massachusetts Institute of Technology (MIT), receiving a B.S. in 1972 in Electrical Engineering, through the Computer Science option. His undergraduate adviser was J.C.R. Licklider and his thesis adviser was Michael Kessler. AtMIT he founded the ACMStudent Chapter and the Student Information Processing Board, receiving the William Stewart Award.

From 1971–1972 he worked as Data Processing Instructor at the Florence Darlington Technical College. From 1972–1978 he was Data Processing Manager at Vulcraft, a Division of NUCOR Corporation, also in Florence, SC. In the fall of 1978 he began his graduate studies at Cornell University in Ithaca, NY, where his adviser was Gerard Salton. He received an M.S. in Computer Science in 1981 and a Ph.D. in 1983. From the summer of 1982 through the spring of 1983 he served as Manager of Information Systems at the International Institute of Tropical Agriculture, Ibadan, Nigeria. From the fall of 1983 through the present he has been on the faculty of the Department of Computer Science at Virginia Tech (also called VPI&SU or Virginia Polytechnic Institute and State University). In 1988 he was given tenure and promoted to the rank of Associate Professor. In 1995 he was promoted to Professor.

Dr. Fox has been an IEEE Senior Member since 2004, an IEEE Member since 2002, an IEEE-CS Member since 2001, and a member of ACM since 1967. He was vice chairman of ACM SIGIR 1987–1991 and then chair 1991–1995. During that period, he helped launch the new ACM SIG on Multimedia. He served as a member of the ACM Publications Board 1988-1992 and as Editor-in-Chief of ACM Press Database and Electronic Products 1988–1991, during which time he helped conceive and launch the ACM Digital Library. He served 2000–2006 as a founder and Co-Editor-in-Chief of the ACM Journal of Education Resources In Computing (JERIC), which led to theACMTransactions on Education. Since 2013 he has been editor for Information Retrieval and Digital Libraries for the ACM Book Series. Over the period 2004–2008 he served as Chairman of the IEEE-CS Technical Committee on Digital Libraries, and continues to serve on its Executive Committee. Dr. Fox served 1995–2008 as Editor of the Morgan Kaufmann Publishers, Inc. Series on Multimedia Information and Systems. Dr. Fox has been a member of Sigma Xi since the 1970s and a member of Upsilon Pi Epsilon since 1998.

Dr. Fox has been (co)PI on over 115 research and development projects. In addition to his courses at Virginia Tech, Dr. Fox has taught over 78 tutorials in more than 28 countries. His publications and presentations include: 17 books, 107 journal/magazine articles, 49 book chapters, 184 refereed (+40 other) conference/workshop papers, 61 posters, 66 keynote/banquet/international invited/distinguished speaker presentations, 38 demonstrations, and over 300 additional presentations. His research and teaching has been on digital libraries, information storage and retrieval, hypertext/hypermedia/multimedia, computing education, computational linguistics, and sub-areas of artificial intelligence.

Ricardo da Silva Torres received a B.Sc. in Computer Engineering from the University of Campinas, Brazil, in 2000. He earned his doctorate in Computer Science at the same university in 2004. Dr. Torres has been Director of the Institute of Computing, University of Campinas since 2013. He is co-founder and member of the RECOD lab. He is the author/co-author of more than 100 articles in refereed journals and conferences and serves as PC member for several international and national conferences. Dr. Torres has supervised 24 master and 5 Ph.D. projects. His research interests include image analysis, content-based image retrieval, databases, digital libraries, and geographic information systems.

Read more
Collapse
Loading...

Additional Information

Publisher
Morgan & Claypool Publishers
Read more
Collapse
Published on
Mar 1, 2014
Read more
Collapse
Pages
205
Read more
Collapse
ISBN
9781627050319
Read more
Collapse
Read more
Collapse
Best For
Read more
Collapse
Language
English
Read more
Collapse
Genres
Computers / Computer Science
Computers / General
Computers / Management Information Systems
Technology & Engineering / Environmental / General
Read more
Collapse
Content Protection
This content is DRM protected.
Read more
Collapse

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
Digital libraries (DLs) have evolved since their launch in 1991 into an important type of information system, with widespread application. This volume advances that trend further by describing new research and development in the DL field that builds upon the 5S (Societies, Scenarios, Spaces, Structures, Streams) framework, which is discussed in three other DL volumes in this series.While the 5S framework may be used to describe many types of information systems, and is likely to have even broader utility and appeal, we focus here on digital libraries. Drawing upon six (Akbar, Kozievitch, Leidig, Li, Murthy, Park) completed and two (Chen, Fouh) in-process dissertations, as well as the efforts of collaborating researchers, and scores of related publications, presentations, tutorials, and reports, this book demonstrates the applicability of 5S in five digital library application areas, that also have importance in the context of the WWW, Web 2.0, and innovative information systems. By integrating surveys of the state-of-the-art, newresearch, connections with formalization, case studies, and exercises/projects, this book can serve as a textbook for those interested in computing, information, and/or library science. Chapter 1 focuses on images, explaining how they connect with information retrieval, in the context of CBIR systems. Chapter 2 gives two case studies of DLs used in education, which is one of the most common applications of digital libraries. Chapter 3 covers social networks, which are at the heart of work onWeb 2.0, explaining the construction and use of deduced graphs, that can enhance retrieval and recommendation. Chapter 4 demonstrates the value of DLs in eScience, focusing, in particular, on cyber-infrastructure for simulation. Chapter 5 surveys geospatial information in DLs, with a case study on geocoding. Given this rich content, we trust that any interested in digital libraries, or in related systems, will find this volume to be motivating, intellectually satisfying, and useful. We hope it will help move digital libraries forward into a science as well as a practice. We hope it will help build community that will address the needs of the next generation of DLs. Table of Contents: Content-Based Image Retrieval / Education / Social Networks in Digital Libraries / eScience and Simulation Digital Libraries / Geospatial Information / Bibliography
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security.

Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.

This book is an ideal resource for security consultants, beginning InfoSec professionals, and students.

Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test.
This is the second book based on the 5S (Societies, Scenarios, Spaces, Structures, Streams) approach to digital libraries (DLs). Leveraging the first volume, on Theoretical Foundations, we focus on the key issues of evaluation and integration. These cross-cutting issues serve as a bridge for those interested in DLs, connecting the introduction and formal discussion in the first book, with the coverage of key technologies in the third book, and of illustrative applications in the fourth book. These two topics have central importance in the DL field, allowing it to be treated scientifically as well as practically. In the scholarly world, we only really understand something if we know how to measure and evaluate it. In the Internet era of distributed information systems, we only can be practical at scale if we integrate across both systems and their associated content. Evaluation of DLs must take place atmultiple levels,so we can address the different entities and their associated measures. Thus, for digital objects, we assess accessibility, pertinence, preservability, relevance, significance, similarity, and timeliness. Other measures are specific to higher-level constructs like metadata, collections, catalogs, repositories, and services.We tie these together through a case study of the 5SQual tool, which we designed and implemented to perform an automatic quantitative evaluation of DLs. Thus, across the Information Life Cycle, we describe metrics and software useful to assess the quality of DLs, and demonstrate utility with regard to representative application areas: archaeology and education. Though integration has been a challenge since the earliest work on DLs, we provide the first comprehensive 5S-based formal description of the DL integration problem, cast in the context of related work. Since archaeology is a fundamentally distributed enterprise, we describe ETANADL, for integrating Near Eastern Archeology sites and information. Thus, we show how 5S-based modeling can lead to integrated services and content. While the first book adopts a minimalist and formal approach to DLs, and provides a systematic and functional method to design and implement DL exploring services, here we broaden to practical DLs with richer metamodels, demonstrating the power of 5S for integration and evaluation.
©2018 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google|Location: United StatesLanguage: English (United States)
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.