Bibliography of Erik Wilde

Total Page:16

File Type:pdf, Size:1020Kb

Bibliography of Erik Wilde dretbiblio dretbiblio Erik Wilde's Bibliography References [1] AFIPS Fall Joint Computer Conference, San Francisco, California, December 1968. [2] Seventeenth IEEE Conference on Computer Communication Networks, Washington, D.C., 1978. [3] ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, Los Angeles, Cal- ifornia, March 1982. ACM Press. [4] First Conference on Computer-Supported Cooperative Work, 1986. [5] 1987 ACM Conference on Hypertext, Chapel Hill, North Carolina, November 1987. ACM Press. [6] 18th IEEE International Symposium on Fault-Tolerant Computing, Tokyo, Japan, 1988. IEEE Computer Society Press. [7] Conference on Computer-Supported Cooperative Work, Portland, Oregon, 1988. ACM Press. [8] Conference on Office Information Systems, Palo Alto, California, March 1988. [9] 1989 ACM Conference on Hypertext, Pittsburgh, Pennsylvania, November 1989. ACM Press. [10] UNIX | The Legend Evolves. Summer 1990 UKUUG Conference, Buntingford, UK, 1990. UKUUG. [11] Fourth ACM Symposium on User Interface Software and Technology, Hilton Head, South Carolina, November 1991. [12] GLOBECOM'91 Conference, Phoenix, Arizona, 1991. IEEE Computer Society Press. [13] IEEE INFOCOM '91 Conference on Computer Communications, Bal Harbour, Florida, 1991. IEEE Computer Society Press. [14] IEEE International Conference on Communications, Denver, Colorado, June 1991. [15] International Workshop on CSCW, Berlin, Germany, April 1991. [16] Third ACM Conference on Hypertext, San Antonio, Texas, December 1991. ACM Press. [17] 11th Symposium on Reliable Distributed Systems, Houston, Texas, 1992. IEEE Computer Society Press. [18] 3rd Joint European Networking Conference, Innsbruck, Austria, May 1992. [19] Fourth ACM Conference on Hypertext, Milano, Italy, November 1992. ACM Press. [20] GLOBECOM'92 Conference, Orlando, Florida, December 1992. IEEE Computer Society Press. http://github.com/dret/biblio (August 29, 2018) 1 dretbiblio [21] IEEE INFOCOM '92 Conference on Computer Communications, Florence, Italy, 1992. IEEE Computer Society Press. [22] IEEE International Conference on Communications, Chicago, Illinois, June 1992. [23] International Workshop on Advanced Teleservices and High-Speed Communication Archi- tectures, Munich, Germany, March 1992. [24] 14th ACM Symposium on Operating Systems Principles, Asheville, North Carolina, Decem- ber 1993. [25] 3rd Australian Multi-Media Communications, Applications and Technology Workshop, Wol- longong, Australia, July 1993. [26] ACM Multimedia 93, Anaheim, California, 1993. ACM Press. [27] Fast Software Encryption, Cambridge Security Workshop Proceedings, volume 809 of Lecture Notes in Computer Science, Cambridge, UK, December 1993. Springer-Verlag. [28] IEEE INFOCOM '93 Conference on Computer Communications, San Francisco, California, 1993. IEEE Computer Society Press. [29] 1. GI/ITG Arbeitstreffen zur Architektur und Implementierung von Hochleistungs- Kommunikationssystemen, Karlsruhe, Germany, January 1994. [30] ACM Sigmetrics Conference on Measurement & Modeling of Computer Systems, Nashville, Tennessee, May 1994. [31] CHI '94: ACM Conference on Human Factors and Computing Systems, Boston, Mas- sachusetts, April 1994. ACM Press. [32] Networking for Global Communications | IEEE INFOCOM '94 Conference on Computer Communications, Toronto, Canada, 1994. IEEE Computer Society Press. [33] Asia-Pacific World Wide Web '95 Conference, Sydney, Australia, September 1995. [34] Bringing Information to People | IEEE INFOCOM '95 Conference on Computer Com- munications, Boston, Massachusetts, 1995. IEEE Computer Society Press. [35] Tenth Annual Workshop on Computer Communications, Eastsound, Washington, Septem- ber 1995. [36] 1996 ACM Conference on Computer Supported Cooperative Work, Boston, Massachusetts, November 1996. ACM Press. [37] 1996 ACM Conference on Hypertext, Washington, D.C., March 1996. ACM Press. [38] Fifth Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises, Stanford, California, June 1996. [39] 3rd Workshop on Open Hypermedia Systems, Southampton, UK, April 1997. [40] GI-Fachtagung Kommunikation in Verteilten Systemen, Braunschweig, Germany, March 1997. [41] IEEE Symposium on Security and Privacy, Oakland, California, May 1997. IEEE Computer Society Press. [42] 9th ACM Conference on Hypertext, Pittsburgh, Pennsylvania, June 1998. ACM Press. [43] Proceeding of the CHI 98 Conference on Human Factors in Computing Systems, Los Angeles, California, April 1998. ACM Press. http://github.com/dret/biblio (August 29, 2018) 2 dretbiblio [44] Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Sys- tems, Seattle, Washington, June 1998. ACM Press. [45] 15th Annual Computer Security Applications Conference, Scottsdale, Arizona, December 1999. IEEE Computer Society Press. [46] 5th Annual Human Factors and the Web Conference, Gaithersburg, Maryland, June 1999. [47] IEEE INFOCOM '99 Conference on Computer Communications, New York, NY, March 1999. IEEE Computer Society Press. [48] 11th ACM Conference on Hypertext and Hypermedia, San Antonio, Texas, May 2000. ACM Press. [49] 33rd Hawaii International Conference on System Sciences, Maui, Hawaii, January 2000. IEEE Computer Society Press. [50] 8th International Conference on Conceptual Structures, volume 1867 of Lecture Notes in Artificial Intelligence, Darmstadt, Germany, August 2000. Springer-Verlag. [51] ACM Conference on Human Factors and Computing Systems (CHI 2000), Amsterdam, Netherlands, April 2000. ACM Press. [52] ECOOP 2000 Workshop on Aspects and Dimensions of Concerns, Cannes, France, June 2000. [53] Fifth ACM Conference on Digital Libraries, San Antonio, Texas, June 2000. ACM Press. [54] 34th Hawaii International Conference on System Sciences, Maui, Hawaii, January 2001. IEEE Computer Society Press. [55] 8th International Conference on Multimedia Modeling, Amsterdam, Netherlands, September 2001. November. [56] 8th International Workshop on Databases and Programming Languages, Rome, Italy, September 2001. [57] Open Publish 2001, Sydney, Australia, July 2001. [58] Twentieth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Sys- tems, Santa Barbara, California, May 2001. ACM Press. [59] 13th International Workhop on Database and Expert Systems Applications (DEXA 2002), Aix-en-Provence, France, September 2002. IEEE Computer Society Press. [60] 2002 ACM Conference on Computer Supported Cooperative Work, New Orleans, Louisiana, November 2002. ACM Press. [61] 2002 ACM Workshop on Digital Rights Management, Washington, D.C., November 2002. [62] 22nd International Conference on Software Engineering, Orlando, Florida, May 2002. ACM Press. [63] 25th Annual International ACM SIGIR Conference on Research and Development in Infor- mation Retrieval, Tampere, Finland, August 2002. ACM Press. [64] ACM SIGCOMM 2002 Conference on Applications, Technologies, Architectures, and Pro- tocols for Computer Communication, Pittsburgh, Pennsylvania, August 2002. ACM Press. [65] ACM SIGMOD 2002 Conference, Madison, Wisconsin, June 2002. [66] CIKM 2002: Eleventh International Conference on Information and Knowledge Manage- ment, McLean, Virginia, November 2002. ACM Press. http://github.com/dret/biblio (August 29, 2018) 3 dretbiblio [67] III Jornadas de Trabajo DOLMEN, Madrid, Spain, November 2002. [68] SIGCHI Conference on Human Factors and Computing Systems (CHI 2002), Minneapolis, Minnesota, April 2002. ACM Press. [69] 2003 ACM Workshop on Digital Rights Management, volume 2696 of Lecture Notes in Computer Science, Washington, D.C., November 2003. Springer-Verlag. [70] 2003 IEEE Symposia on Human Centric Computing Languages and Environments, Auck- land, New Zealand, October 2003. [71] 26th Annual International ACM SIGIR Conference on Research and Development in Infor- mation Retrieval, Toronto, Canada, July 2003. ACM Press. [72] 30th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, New Orleans, Louisiana, January 2003. ACM Press. [73] 36th Hawaii International Conference on System Sciences, Big Island, Hawaii, January 2003. IEEE Computer Society Press. [74] 7th World Multiconference on Systemics, Cybernetics, and Informatics, Orlando, Florida, July 2003. [75] First Biennial Conference on Innovative Data Systems Research, Asilomar, California, Jan- uary 2003. [76] Third ACM/IEEE-CS Joint Conference on Digital Libraries, Houston, Texas, May 2003. ACM Press. [77] 2004 Colleges, Code and Intellectual Property Conference, College Park, Maryland, April 2004. [78] 26th International Conference on Software Engineering, Edinburgh, UK, May 2004. ACM Press. [79] 37th Hawaii International Conference on System Sciences, Big Island, Hawaii, January 2004. IEEE Computer Society Press. [80] GLOBECOM 2004 Conference, Dallas, Texas, November 2004. IEEE Computer Society Press. [81] Intuitive Human Interfaces for Organizing and Accessing Intellectual Assets, volume 3359 of Lecture Notes in Computer Science, Dagstuhl, Germany, March 2004. Springer-Verlag. [82] Second Workshop on Semantics in Peer-to-Peer and Grid Computing, New York, NY, May 2004. [83] Workshop on Building Software for Pervasive Computing at OOPSLA'04, Vancouver, Canada, October 2004. [84] 2005 International Conference on Mobile Business, Sydney, Australia, July 2005. IEEE Computer Society Press. [85] IEEE International Conference on E-Business Engineering, Beijing, China, October 2005. IEEE Computer Society Press. [86] OpenEd2005 Conference, Logan, Utah, September 2005. [87] 3rd Biennial meeting of the International Environmental Modelling and Software Society,
Recommended publications
  • On the Integrity and Trustworthiness of Web Produced Data
    CORE Metadata, citation and similar papers at core.ac.uk Provided by Open Repository of the University of Porto On the Integrity and Trustworthiness of web produced data Luís A. Maia Mestrado Integrado em Engenharia de Redes e Sistemas Informáticos Departamento de Ciência de Computadores 2013 Orientador Professor Doutor Manuel Eduardo Carvalho Duarte Correia, Professor Auxiliar do Departamento de Computadores, Faculdade de Ciências da Universidade do Porto Todas as correções determinadas pelo júri, e só essas, foram efetuadas. O Presidente do Júri, Porto, ______/______/_________ Acknowledgments I would like to express my appreciation for the help of my supervisor in researching and bringing different perspectives and to thank my family, for their support and dedication. 3 Abstract Information Systems have been a key tool for the overall performance improvement of administrative tasks in academic institutions. While most systems intend to deliver a paperless environment to each institution it is recurrent that document integrity and accountability is still relying on traditional methods such as producing physical documents for signing and archiving. While this method delivers a non-efficient work- flow and has an effective monetary cost, it is still the common method to provide a degree of integrity and accountability on the data contained in the databases of the information systems. The evaluation of a document signature is not a straight forward process, it requires the recipient to have a copy of the signers signature for comparison and training beyond the scope of any office employee training, this leads to a serious compromise on the trustability of each document integrity and makes the verification based entirely on the trust of information origin which is not enough to provide non-repudiation to the institutions.
    [Show full text]
  • XML Signature/Encryption — the Basis of Web Services Security
    Special Issue on Security for Network Society Falsification Prevention and Protection Technologies and Products XML Signature/Encryption — the Basis of Web Services Security By Koji MIYAUCHI* XML is spreading quickly as a format for electronic documents and messages. As a consequence, ABSTRACT greater importance is being placed on the XML security technology. Against this background research and development efforts into XML security are being energetically pursued. This paper discusses the W3C XML Signature and XML Encryption specifications, which represent the fundamental technology of XML security, as well as other related technologies originally developed by NEC. KEYWORDS XML security, XML signature, XML encryption, Distributed signature, Web services security 1. INTRODUCTION 2. XML SIGNATURE XML is an extendible markup language, the speci- 2.1 Overview fication of which has been established by the W3C XML Signature is an electronic signature technol- (WWW Consortium). It is spreading quickly because ogy that is optimized for XML data. The practical of its flexibility and its platform-independent technol- benefits of this technology include Partial Signature, ogy, which freely allows authors to decide on docu- which allows an electronic signature to be written on ment structures. Various XML-based standard for- specific tags contained in XML data, and Multiple mats have been developed including: ebXML and Signature, which enables multiple electronic signa- RosettaNet, which are standard specifications for e- tures to be written. The use of XML Signature can commerce transactions, TravelXML, which is an EDI solve security problems, including falsification, spoof- (Electronic Data Interchange) standard for travel ing, and repudiation. agencies, and NewsML, which is a standard specifica- tion for new distribution formats.
    [Show full text]
  • Katalog Elektronskih Knjiga
    KATALOG ELEKTRONSKIH KNJIGA Br Autor Naziv Godina ISBN Str. Porijeklo izdavanja 1 Peter Kent Pay Per Click Search 2006 0-471-74594-3 130 Kupovina Engine Marketing for Dummies 2 Terry Large Access 1 2007 Internet Freeware 3 Kevin Smith Excel Lassons & Tutorials 2004 Internet Freeware 4 Terry Michael Photografy Tutorials 2006 Internet Freeware Janine Peterson Phil Pivnick 5 Jake Ludington Converting Vinyl LPs 2003 Internet Freeware to CD 6 Allen Wyatt Cleaning Windows XP 2004 0-7645-7311-X Poklon for Dummies 7 Peter Kent Sarch Engine Optimization 2006 0-4717-5441-2 Kupovina for Dummies 8 Terry Large Access 2 2007 Internet Freeware 9 Dirk Dupon How to write, create, 2005 Internet Freeware promote and sell E-books on the Internet 10 Chayden Bates eBook Marketing 2000 Internet Freeware Explained 11 Kevin Sinclair How To Choose A 1999 Internet Freeware Homebased Bussines 12 Bob McElwain 101 Newbie-Frendly Tips 2001 Internet Freeware 13 Windows Basics 2004 Poklon 14 Michael Abrash Zen of Graphic 2005 Poklon Programming, 2. izdanje 15 13 Hot Internet 2000 Internet Freeware Moneymaking Methods 16 K. Williams The Complete HTML 1998 Poklon Teacher 17 C. Darwin On the Origin of Species Internet Freeware 2/175 Br Autor Naziv Godina ISBN Str. Porijeklo izdavanja 18 C. Darwin The Variation of Animals Internet Freeware 19 Bruce Eckel Thinking in C++, Vol 1 2000 Internet Freeware 20 Bruce Eckel Thinking in C++, Vol 2 2000 Internet Freeware 21 James Parton Captains of Industry 1890 399 Internet Freeware 22 Bruno R. Preiss Data Structures and 1998 Internet
    [Show full text]
  • Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation
    Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation vorgelegt von Dipl.-Inform. Sebastian Jürg Göndör geb. in Duisburg von der Fakultät IV – Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften - Dr.-Ing. - genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr. Thomas Magedanz Gutachter: Prof. Dr. Axel Küpper Gutachter: Prof. Dr. Ulrik Schroeder Gutachter: Prof. Dr. Maurizio Marchese Tag der wissenschaftlichen Aussprache: 6. Juni 2018 Berlin 2018 iii A Bill of Rights for Users of the Social Web Authored by Joseph Smarr, Marc Canter, Robert Scoble, and Michael Arrington1 September 4, 2007 Preamble: There are already many who support the ideas laid out in this Bill of Rights, but we are actively seeking to grow the roster of those publicly backing the principles and approaches it outlines. That said, this Bill of Rights is not a document “carved in stone” (or written on paper). It is a blog post, and it is intended to spur conversation and debate, which will naturally lead to tweaks of the language. So, let’s get the dialogue going and get as many of the major stakeholders on board as we can! A Bill of Rights for Users of the Social Web We publicly assert that all users of the social web are entitled to certain fundamental rights, specifically: Ownership of their own personal information, including: • their own profile data • the list of people they are connected to • the activity stream of content they create; • Control of whether and how such personal information is shared with others; and • Freedom to grant persistent access to their personal information to trusted external sites.
    [Show full text]
  • Mac OS X Server Administrator's Guide
    034-9285.S4AdminPDF 6/27/02 2:07 PM Page 1 Mac OS X Server Administrator’s Guide K Apple Computer, Inc. © 2002 Apple Computer, Inc. All rights reserved. Under the copyright laws, this publication may not be copied, in whole or in part, without the written consent of Apple. The Apple logo is a trademark of Apple Computer, Inc., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Apple, the Apple logo, AppleScript, AppleShare, AppleTalk, ColorSync, FireWire, Keychain, Mac, Macintosh, Power Macintosh, QuickTime, Sherlock, and WebObjects are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. AirPort, Extensions Manager, Finder, iMac, and Power Mac are trademarks of Apple Computer, Inc. Adobe and PostScript are trademarks of Adobe Systems Incorporated. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Netscape Navigator is a trademark of Netscape Communications Corporation. RealAudio is a trademark of Progressive Networks, Inc. © 1995–2001 The Apache Group. All rights reserved. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd. 062-9285/7-26-02 LL9285.Book Page 3 Tuesday, June 25, 2002 3:59 PM Contents Preface How to Use This Guide 39 What’s Included
    [Show full text]
  • Sams Teach Yourself XML in 21 Days
    Steven Holzner Teach Yourself XML in 21 Days THIRD EDITION 800 East 96th Street, Indianapolis, Indiana, 46240 USA Sams Teach Yourself XML in 21 Days, ASSOCIATE PUBLISHER Michael Stephens Third Edition ACQUISITIONS EDITOR Copyright © 2004 by Sams Publishing Todd Green All rights reserved. No part of this book shall be reproduced, stored in a retrieval DEVELOPMENT EDITOR system, or transmitted by any means, electronic, mechanical, photocopying, record- Songlin Qiu ing, or otherwise, without written permission from the publisher. No patent liability MANAGING EDITOR is assumed with respect to the use of the information contained herein. Although every precaution has been taken in the preparation of this book, the publisher and Charlotte Clapp author assume no responsibility for errors or omissions. Nor is any liability assumed PROJECT EDITOR for damages resulting from the use of the information contained herein. Matthew Purcell International Standard Book Number: 0-672-32576-4 INDEXER Library of Congress Catalog Card Number: 2003110401 Mandie Frank PROOFREADER Printed in the United States of America Paula Lowell First Printing: October 2003 TECHNICAL EDITOR 06050403 4321 Chris Kenyeres Trademarks TEAM COORDINATOR Cindy Teeters All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Sams Publishing cannot attest to the accuracy INTERIOR DESIGNER of this information. Use of a term in this book should not be regarded as affecting Gary Adair the validity of any trademark or service mark. COVER DESIGNER Warning and Disclaimer Gary Adair PAGE LAYOUT Every effort has been made to make this book as complete and as accurate as possi- ble, but no warranty or fitness is implied.
    [Show full text]
  • North Korea Purloins Russian Technology to Add Teeth to Its Military Caliber
    NEW DELHI TIMES R.N.I. No 53449/91 DL-SW-01/4124/17-19 (Monday/Tuesday same week) (Published Every Monday) New Delhi Page 16 Rs. 7.00 22 - 28 July 2019 Vol - 29 No. 25 Email : [email protected] Founder : Dr. Govind Narain Srivastava ISSN -2349-1221 Modi irradiates Christian victims of loopholed Defence Muslim oppression Procurement rot in Thailand With the world at large progressing with positive The country code of 66 on the incoming call speed and the concept of globalization seeing was unfamiliar, as was the number. its frutation with the spread of co-operative Usually I ignore such calls as they invariably and collaborative networks worldwide; among are threats from the worldwide network of the civic, economic and political spheres, the my fans or duct-cleaning companies worried defence sector of any nation in the modern about the air I breathe. But on that day, I took era becomes the top-priority... a chance. The other option... By Dr. Ankit Srivastava Page 3 By Tarek Fatah Page 2 North Korea purloins Russian technology to add teeth to its Military Caliber By NDT Special Bureau Page 2 Babies growing up with animals, Belief aids to climb the ladder Iran and its prospects for build stronger immune system of Success Democracy I meet so many mothers who won’t let their children walk All of us are on a daily struggle to be successful so as to be More than 80 million Iranians at home or living across the barefoot in the house or the park, won’t let them touch able to establish ourselves in society.
    [Show full text]
  • Front 01: HTML Y
    HTML Y CSS FRONT PRIMERA PARTE Guía para directivos y técnicos V.1 Front HTML y CSS Este documento forma parte de las guías de onboarding de Autentia. Si te apasiona el desarrollo de software de calidad ayúdanos a difundirlas y anímate a unirte al equipo. Este es un documento vivo y puedes encontrar la última versión, así como el resto de partes que completan este documento, en nuestra web. https://www.autentia.com/libros/ Esta obra está licenciada bajo la licencia Creative Commons Attribution ShareAlike 4.0 International (CC BY-SA 4.0) FRONT - HTML Y CSS Hoy en día el negocio está en la que se publican y organizan los red. Es en el mercado on-line contenidos, además del grado donde se producen la mayor parte de usabilidad y accesibilidad de de los intercambios comerciales los mismos, influye directamente entre clientes y proveedores. en el posicionamiento que los El primer contacto de nuestros motores de búsqueda asignan a usuarios con nuestro negocio, y las aplicaciones. en muchos casos el único, es a través de una aplicación web o móvil. No disponer de un diseño atractivo, una experiencia de usuario agradable, accesible y que se adapte de manera adecuada para ser usada en diferentes dispositivos (Responsive), es garantía de una pérdida masiva de potenciales clientes. De la misma manera, la forma en la FRONT - HTML Y CSS “No hay una segunda oportunidad para una primera impresión” Alcanzar la habilidad de realizar diseños profesionales y usables no es algo baladí y se necesita un conocimiento profundo en marketing digital, experiencia de usuario y en tecnologías front-end.
    [Show full text]
  • CSS Containers: Making Websites Accessible to Disabled Users
    CSS containers: making websites accessible to disabled users John R Hudson 1 May 2020∗ 1 Personal background I first became interested in page design as a student journalist at university. When I first started using a micro-computer, I was interested in how much time it could save me; when I discovered vector graphics in the mid 1980s, I realised that I could save time and produce quality output by using a computer. In the 1990s I worked with a blind student and learned how I could use my computing skills to make life easier for him. After 30 years of using my understanding to create quality printed documents and more recently PDF files, in 2010 I was inspired by a talk from David Fisher to put these principles to work in maintaining and developing websites. 2 The wider context Cascading style sheets (CSS), proposed in 1994 by Håkon Wium Lie, who worked at CERN, were first adopted by Microsoft in Internet Explorer 3 and then by Netscape and Opera. These separate the presentation of material on a website from its content and structure as defined by HTML. At the turn of the century, they went out of favour for a number of reasons and development focused on XHTML. But, a few years later, Mozilla, Apple and Opera began working on a new specification for HTML which would meet the needs of modern devices and which would rely on CSS for presentation. This was published in 2011 as a rolling release and work began on a series of rolling updates to CSS to cope with the needs of the new version of HTML and the demands of modern devices.
    [Show full text]
  • Open Source Software Attributions for ASCET-DEVELOPER 7.3.0
    ASCET-DEVELOPER 7.3.0 OSS Attributions Open Source Software Attributions for ASCET-DEVELOPER 7.3.0 This document is provided as part of the fulfillment of OSS license conditions and does not require users to take any action before or while using the product. Page 1 of 102 ASCET-DEVELOPER 7.3.0 OSS Attributions Table of Contents Contents 1 List of used Open Source Components. ................................................................................................ 3 2 Appendix - License Text ................................................................................................................. 15 2.1 ANTLR Software Rights Notice .................................................................................................. 15 2.2 ASM License ......................................................................................................................... 16 2.3 Apache License 1.1 ................................................................................................................. 17 2.4 Apache License 2.0 ................................................................................................................. 18 2.5 BSD (Three Clause License) ...................................................................................................... 21 2.6 BSD 4-clause "Original" or "Old" License ..................................................................................... 22 2.7 Common Development and Distribution License 1.0.....................................................................
    [Show full text]
  • Bookings of Westin Diplomat Bookings
    RESTful Web Applications with Spring 3.0 Arjen Poutsma Senior Software Engineer SpringSource Speaker’s qualifications • Fifteen years of experience in Enterprise Software Development • Six years of Web service experience • Development lead of Spring Web Services • Working on Spring 3.0 • Contributor to various Open Source frameworks: (XFire, Axis2, NEO, ...) SpringSource Confidential. Do not distribute without express permission Overview • RESTful URLs • URI templates • Content negotiation • HTTP method conversion • ETag support SpringSource Confidential. Do not distribute without express permission RESTful URLs Resources • URLs are unique identifiers for Resources • Typically nouns • Customer • Orders • Shopping cart URLs [scheme:][//authority][path][?query][#fragment] http://www.springsource.com https://mybank.com http://www.google.com/search?q=arjen %20poutsma http://java.sun.com/j2se/1.4.2/docs/api/java/lang/ String.html#indexOf(int) SpringSource Confidential. Do not distribute without express permission Paths • Represents hierarchy • Represents value for consumers • Collections on higher levels SpringSource Confidential. Do not distribute without express permission Example Path Description /hotels List of all hotels /hotels/westindiplomat Details of Westin Diplomat /hotels/westindiplomat/ List of bookings of Westin Diplomat bookings /hotels/westindiplomat/ Individual booking bookings/42584 No Hierarchy? Path Description maps/24.9195,17.821 Commas maps/24.9195;17.821 Semicolons Query Variables • Input for algorithms • Get ignored by proxies
    [Show full text]
  • UK Research Data Registry Mapping Schemes
    UK Research Data Registry Mapping Schemes Project Information Project Identifier PID TBC Project Title UK Research Data (Metadata) Registry Pilot Project Hashtag #jiscrdr Start Date 1 October 2013 End Date 31 March 2014 Lead Institution Jisc Project Director Rachel Bruce Project Manager — Contact Email — Partner Institutions Digital Curation Centre (Universities of Edinburgh, Glasgow, Bath); UKDA (University of Essex) Project Webpage URL TBC Programme Name Jisc Capital Programme Document Information Author(s) and Role(s) Alex Ball (Metadata Coordinator) Date 12 February 2014 Project Refs T3.1; D3.1 Filename uk-rdr-mapping-v06.pdf URL TBD Access This report is for general dissemination Document History Version Date Comments 01 29 November 2013 Summary of RIF-CS. First draft of DDI mapping. 02 8 January 2014 Second draft of DDI mapping. First draft of DataCite mapping. 03 22 January 2014 New introduction. Expanded summary of RIF-CS. First draft of EPrints ReCollect, NERC Discovery, and OAI-PMH Dublin Core mappings. 04 23 January 2014 Section on tips for contributors. 05 31 January 2014 Second draft of NERC Discovery (UK GEMINI), EPrints mappings. 06 12 February 2014 Third draft of DDI mapping. 1 Contents 1 Introduction 3 1.1 Typographical conventions . 3 2 RIF-CS 4 2.1 Elements . 4 2.2 Controlled vocabularies . 8 3 Internally managed RIF-CS elements 20 4 Mapping from DDI to RIF-CS 21 4.1 Related Objects . 22 5 Mapping from UK GEMINI 2 to RIF-CS 24 5.1 Related Objects . 26 6 Mapping from DataCite to RIF-CS 27 6.1 Related Objects .
    [Show full text]