Search History

Search History
Author: Eugene Lim
Publsiher: Coffee House Press
Total Pages: 162
Release: 2021-10-05
Genre: Fiction
ISBN: 9781566896269

Download Search History Book in PDF, Epub and Kindle

Search History oscillates between a wild cyberdog chase and lunch-date monologues as Eugene Lim deconstructs grieving and storytelling with uncanny juxtapositions and subversive satire. Frank Exit is dead—or is he? While eavesdropping on two women discussing a dog-sitting gig over lunch, a bereft friend comes to a shocking realization: Frank has been reincarnated as a dog! This epiphany launches a series of adventures—interlaced with digressions about AI-generated fiction, virtual reality, Asian American identity in the arts, and lost parents—as an unlikely cast of accomplices and enemies pursues the mysterious canine. In elliptical, propulsive prose, Search History plumbs the depths of personal and collective consciousness, questioning what we consume, how we grieve, and the stories we tell ourselves.

Web History Tools and Revisitation Support

Web History Tools and Revisitation Support
Author: Matthias Mayer
Publsiher: Now Publishers Inc
Total Pages: 118
Release: 2009-04-28
Genre: Computers
ISBN: 9781601982261

Download Web History Tools and Revisitation Support Book in PDF, Epub and Kindle

Summarizes existing knowledge about revisitations on the web, and surveys the potential of graphic based web history tools.

Librarian s Guide to Online Searching

Librarian s Guide to Online Searching
Author: Christopher C. Brown
Publsiher: Bloomsbury Publishing USA
Total Pages: 393
Release: 2021-06-18
Genre: Language Arts & Disciplines
ISBN: 9781440878244

Download Librarian s Guide to Online Searching Book in PDF, Epub and Kindle

Updates the premier textbook for students and librarians needing to know the landscape of current databases and how to search them. Librarians need to know of existing databases, and they must be able to teach search capabilities and strategies to library users. This practical guide introduces librarians to a broad spectrum of fee-based and freely available databases and explains how to teach them. The updated 6th edition of this well-regarded text covers new databases on the market as well as updates to older databases. It also explains underlying information structures and demonstrates how to search most effectively. It introduces readers to several recent changes, such as the move away from metadata-based indexing to full text indexing by vendors covering newspaper content. Business databases receive greater emphasis. As in the previous editions, this book takes a real-world approach, covering topics from basic and advanced search tools to online subject databases. Each chapter includes a thorough discussion, a recap, concrete examples, exercises, and points to consider, making it an ideal text for courses in database searching as well as a trustworthy professional resource.

Database and Expert Systems Applications

Database and Expert Systems Applications
Author: Sven Hartmann,Hui Ma
Publsiher: Springer
Total Pages: 465
Release: 2016-08-05
Genre: Computers
ISBN: 9783319444062

Download Database and Expert Systems Applications Book in PDF, Epub and Kindle

This two volume set LNCS 9827 and LNCS 9828 constitutes the refereed proceedings of the 27th International Conference on Database and Expert Systems Applications, DEXA 2016, held in Porto, Portugal, September 2016. The 39 revised full papers presented together with 29 short papers were carefully reviewed and selected from 137 submissions. The papers discuss a range of topics including: Temporal, Spatial, and High Dimensional Databases; Data Mining; Authenticity, Privacy, Security, and Trust; Data Clustering; Distributed and Big Data Processing; Decision Support Systems, and Learning; Data Streams; Data Integration, and Interoperability; Semantic Web, and Data Semantics; Social Networks, and Network Analysis; Linked Data; Data Analysis; NoSQL, NewSQL; Multimedia Data; Personal Information Management; Semantic Web and Ontologies; Database and Information System Architectures; Query Answering and Optimization; Information Retrieval, and Keyword Search; Data Modelling, and Uncertainty.

Similarity Search and Applications

Similarity Search and Applications
Author: Nieves Brisaboa,Oscar Pedreira,Pavel Zezula
Publsiher: Springer
Total Pages: 332
Release: 2013-08-30
Genre: Computers
ISBN: 9783642410628

Download Similarity Search and Applications Book in PDF, Epub and Kindle

This book constitutes the refereed proceedings of the 6th International Conference on Similarity Search and Applications, SISAP 2013, held in A Coruña, Spain, in October 2013. The 19 full papers, 6 short papers and 2 demo papers, presented were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on new scenarios and approaches; improving similarity search methods and techniques; metrics and evaluation; applications and specific domains; and implementation and engineering solutions.

Protecting Patron Privacy

Protecting Patron Privacy
Author: Matthew A. Beckstrom
Publsiher: Bloomsbury Publishing USA
Total Pages: 118
Release: 2015-06-11
Genre: Language Arts & Disciplines
ISBN: 9781610699976

Download Protecting Patron Privacy Book in PDF, Epub and Kindle

Protect patron privacy and safeguard Internet usage using this how-to manual for creating a secure environment in your library. You'll learn how simple changes to your policies, procedures, and computer settings can ensure a private and safe research space for users. In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research—if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices. Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount importance, explains the applicable laws and regulations related to patron privacy, and delves into the mechanics of security breaches on public computers. The second half outlines the practical steps you can take to preserve the rights of library visitors by working with computer and mobile device configurations, network security settings, and special applications.

Internet Cool Tools for Physicians

Internet Cool Tools for Physicians
Author: Melissa Rethlefsen,David Rothman,Daniel Mojon
Publsiher: Springer Science & Business Media
Total Pages: 144
Release: 2008-11-19
Genre: Medical
ISBN: 9783540763826

Download Internet Cool Tools for Physicians Book in PDF, Epub and Kindle

Feel like you're being sucked down into a swirl of never-ending information? Today's physicians are faced with new advances in medicine and new research that can impact practice, but finding the right information at the right time seems overwhelming in the constant deluge of scientific research. That's where this illustrated guide will walk you through some of today's most useful Internet tools, tools that can help you find, manage, and organize the information you need, so that it is always at your fingertips, whether for patient care, research, practice, or fun.

Privacy Enhancing Technologies

Privacy Enhancing Technologies
Author: Mikhail Atallah,Nicholas Hopper
Publsiher: Springer Science & Business Media
Total Pages: 300
Release: 2010-07-12
Genre: Computers
ISBN: 9783642145261

Download Privacy Enhancing Technologies Book in PDF, Epub and Kindle

This book constitutes the refereed proceedings of the 10th International Symposium, PETS 2010, held in Berlin, Germany in July 2010. The 16 revised full papers were carefully reviewed and selected from 57 submissions for inclusion in the book. The papers handle topics such as access control, privacy of web based search, anonymus webs of trust, security attacks, active timing attacks in lo-latency anonymus communication, network topology and web search with malicious adversaries