Jane Greenberg is the Alice B. Kroeger Professor and Director of the Metadata Research Center http://cci.drexel.edu/mrc/ at the College of Computing and Informatics, Drexel University. Her research activities focus on metadata, knowledge organization/ semantics, linked data, data science, and economics. She serves on the advisory board of the Dublin Core Metadata Initiative (DCMI) and the steering committee for the NSF Northeast Big Data Innovation Hub (NEBDIH) http://nebigdatahub.org/ . She is a principal investigator on the NSF Spoke initiative, “A
Maintaining the accessibility of collections for future generations is a central mission of libraries and other memory institutions. Metadata longevity should be ensured to keep the long-term accessibility of data collections. However, we are facing the difficulties in metadata longevity, such as the consistent maintenance of metadata, maintenance of metadata vocabularies and metadata terms, structural and syntactic features of metadata, metadata description rules, and so forth. This paper focuses on consistent maintenance of metadata
simple spreadsheet-based, MIAME-supportive format for microarray data: MAGE-TAB. BMC Bioinformatics. 2006; 7: 489.
ArrayExpress, Functional Genomics Database at European Bioinformatics Institute. [cited 2011 May 3] ( http://www.ebi.ac.uk/microarray-as/ae/
DC (Dublin Core) Metadata Initiative [Internet]. [cited 2011 May 3] ( http://dublincore.org/
Lors RK, van Ginneken AM, van der Lei J. OpenSDE: a strategy for expressive and flexible structured data entry. Int J Med Inform. 2005; 74(6): 481
Tudorache George-Stelian, Ionac Nicoleta, Maco Bogdan and Manea Ancuța
Aguilar, E., Auer, I., Brunet, M., Peterson, T. C., Wieringa, J. (2003), Guidance on metadata and homogenization, Wmo Td, 1186, 53.
Ciurlau, D., Sasu, M. (2015), The comparison between two early blizzard events occurred in Romania durind the time, Aerul si Apa. Componente ale Mediului, 340.
Ciurlau, D. (2016) , Early Blizzard Phenomena in Southeastern Romania. Case Study: 2–3 November 1980, Present Environment and Sustainable Development, 10(1), 105-116.
Ciurlau, D., Ionac, N. (2013), Weather costs. Case study
Kirill Nikitin, Ludovic Barman, Wouter Lueks, Matthew Underwood, Jean-Pierre Hubaux and Bryan Ford
Wustrow. The use of TLS in Censorship Circumvention. In Network and Distributed System Security (NDSS) Symposium , 2019.
 Craig Gentry and Brent Waters. Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts). In Antoine Joux, editor, Annual International Conference on the Theory and Applications of Cryptographic Techniques , pages 171–188, 2009.
 Yoel Gluck, Neal Harris, and Angelo Prado. BREACH: reviving the CRIME attack. Black Hat USA, 2013.
 B. Greschbach, G. Kreitz, and S. Buchegger. The devil is in the metadata
Stephan Heuser, Bradley Reaves, Praveen Kumar Pendyala, Henry Carter, Alexandra Dmitrienko, William Enck, Negar Kiyavash, Ahmad-Reza Sadeghi and Patrick Traynor
The majority of people across the globe rely on telephony networks as their primary means of communication. As such, many of the most sensitive personal, corporate and government related communications pass through these systems every day. Unsurprisingly, such connections are subject to a wide range of attacks. Of increasing concern is the use of metadata contained in Call Detail Records (CDRs), which contain source, destination, start time and duration of a call. This information is potentially dangerous as the very act of two parties communicating can reveal significant details about their relationship and put them in the focus of targeted observation or surveillance, which is highly critical especially for journalists and activists. To address this problem, we develop the Phonion architecture to frustrate such attacks by separating call setup functions from call delivery. Specifically, Phonion allows users to preemptively establish call circuits across multiple providers and technologies before dialing into the circuit and does not require constant Internet connectivity. Since no single carrier can determine the ultimate destination of the call, it provides unlinkability for its users and helps them to avoid passive surveillance. We define and discuss a range of adversary classes and analyze why current obfuscation technologies fail to protect users against such metadata attacks. In our extensive evaluation we further analyze advanced anonymity technologies (e.g., VoIP over Tor), which do not preserve our functional requirements for high voice quality in the absence of constant broadband Internet connectivity and compatibility with landline and feature phones. Phonion is the first practical system to provide guarantees of unlinkable communication against a range of practical adversaries in telephony systems.
Kliment, T. (2009): Metainformation infrastructure for spatial information. Written part of dissertation examination. Department of Theoretical Geodesy, Faculty of Civil Engineering, Slovak University of Technology, Bratislava
Nogueras-Iso, J. et al. (2005): Geographic Information Metadata for Spatial Data Infrastructures - Resources, Interoperability and Information Retrieval. Springer Verlag
Ožana, R. (2007): Evaluation of GeoNetwork Opensource Features and Suitability
Androvitsaneas, C., B. Sundgren, and L. Thygesen. 2006. “Towards an SDMX User Guide: Exchange of Statistical Data and Metadata Between Different Systems, National and International.” OECD Expert Group on Statistical Data and Metadata Exchange, Geneva, 6-7 April 2006. Available at: https://sites.google.com/site/bosundgren/my-life (accessed November 2013).
Banca d’Italia. 2007. The Matrix Model. Unified Model for Statistical Data Representation and Processing. Available at: https
search applications such as book seller or library catalogs. Even Amazon relies on information about the book (metadata) more than the book content and complements its search functionality with additional features, such as a recommendation system based on purchase histories.
This article explores the effectiveness of different book metadata elements in satisfying book search requests This text is an adapted and extended version of two conference papers: [ 5 ] and [ 6 ]. . Different types of metadata elements, such as bibliographic metadata, controlled vocabulary (CV