Search Results

1 - 10 of 184 items :

Clear All
Big Metadata, Smart Metadata, and Metadata Capital: Toward Greater Synergy Between Data Science and Metadata

Jane Greenberg is the Alice B. Kroeger Professor and Director of the Metadata Research Center http://cci.drexel.edu/mrc/ at the College of Computing and Informatics, Drexel University. Her research activities focus on metadata, knowledge organization/ semantics, linked data, data science, and economics. She serves on the advisory board of the Dublin Core Metadata Initiative (DCMI) and the steering committee for the NSF Northeast Big Data Innovation Hub (NEBDIH) http://nebigdatahub.org/ . She is a principal investigator on the NSF Spoke initiative, “A

Open access
Provenance Description of Metadata Vocabularies for the Long-term Maintenance of Metadata

1 Introduction Maintaining the accessibility of collections for future generations is a central mission of libraries and other memory institutions. Metadata longevity should be ensured to keep the long-term accessibility of data collections. However, we are facing the difficulties in metadata longevity, such as the consistent maintenance of metadata, maintenance of metadata vocabularies and metadata terms, structural and syntactic features of metadata, metadata description rules, and so forth. This paper focuses on consistent maintenance of metadata

Open access
Metadata Management and Semantics in Microarray Repositories

simple spreadsheet-based, MIAME-supportive format for microarray data: MAGE-TAB. BMC Bioinformatics. 2006; 7: 489. ArrayExpress, Functional Genomics Database at European Bioinformatics Institute. [cited 2011 May 3] ( http://www.ebi.ac.uk/microarray-as/ae/ DC (Dublin Core) Metadata Initiative [Internet]. [cited 2011 May 3] ( http://dublincore.org/ Lors RK, van Ginneken AM, van der Lei J. OpenSDE: a strategy for expressive and flexible structured data entry. Int J Med Inform. 2005; 74(6): 481

Open access
Changes of historical metadata reflected in the wind parameters at Iași meteorological station

References Aguilar, E., Auer, I., Brunet, M., Peterson, T. C., Wieringa, J. (2003), Guidance on metadata and homogenization, Wmo Td, 1186, 53. Ciurlau, D., Sasu, M. (2015), The comparison between two early blizzard events occurred in Romania durind the time, Aerul si Apa. Componente ale Mediului, 340. Ciurlau, D. (2016) , Early Blizzard Phenomena in Southeastern Romania. Case Study: 2–3 November 1980, Present Environment and Sustainable Development, 10(1), 105-116. Ciurlau, D., Ionac, N. (2013), Weather costs. Case study

Open access
Reducing Metadata Leakage from Encrypted Files and Communication with PURBs

Wustrow. The use of TLS in Censorship Circumvention. In Network and Distributed System Security (NDSS) Symposium , 2019. [24] Craig Gentry and Brent Waters. Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts). In Antoine Joux, editor, Annual International Conference on the Theory and Applications of Cryptographic Techniques , pages 171–188, 2009. [25] Yoel Gluck, Neal Harris, and Angelo Prado. BREACH: reviving the CRIME attack. Black Hat USA, 2013. [26] B. Greschbach, G. Kreitz, and S. Buchegger. The devil is in the metadata

Open access
Phonion: Practical Protection of Metadata in Telephony Networks

Abstract

The majority of people across the globe rely on telephony networks as their primary means of communication. As such, many of the most sensitive personal, corporate and government related communications pass through these systems every day. Unsurprisingly, such connections are subject to a wide range of attacks. Of increasing concern is the use of metadata contained in Call Detail Records (CDRs), which contain source, destination, start time and duration of a call. This information is potentially dangerous as the very act of two parties communicating can reveal significant details about their relationship and put them in the focus of targeted observation or surveillance, which is highly critical especially for journalists and activists. To address this problem, we develop the Phonion architecture to frustrate such attacks by separating call setup functions from call delivery. Specifically, Phonion allows users to preemptively establish call circuits across multiple providers and technologies before dialing into the circuit and does not require constant Internet connectivity. Since no single carrier can determine the ultimate destination of the call, it provides unlinkability for its users and helps them to avoid passive surveillance. We define and discuss a range of adversary classes and analyze why current obfuscation technologies fail to protect users against such metadata attacks. In our extensive evaluation we further analyze advanced anonymity technologies (e.g., VoIP over Tor), which do not preserve our functional requirements for high voice quality in the absence of constant broadband Internet connectivity and compatibility with landline and feature phones. Phonion is the first practical system to provide guarantees of unlinkable communication against a range of practical adversaries in telephony systems.

Open access
Metainformation infrastructure for geospatial information

References Kliment, T. (2009): Metainformation infrastructure for spatial information. Written part of dissertation examination. Department of Theoretical Geodesy, Faculty of Civil Engineering, Slovak University of Technology, Bratislava Nogueras-Iso, J. et al. (2005): Geographic Information Metadata for Spatial Data Infrastructures - Resources, Interoperability and Information Retrieval. Springer Verlag Ožana, R. (2007): Evaluation of GeoNetwork Opensource Features and Suitability

Open access
Statistical Metadata: a Unified Approach to Management and Dissemination

References Androvitsaneas, C., B. Sundgren, and L. Thygesen. 2006. “Towards an SDMX User Guide: Exchange of Statistical Data and Metadata Between Different Systems, National and International.” OECD Expert Group on Statistical Data and Metadata Exchange, Geneva, 6-7 April 2006. Available at: https://sites.google.com/site/bosundgren/my-life (accessed November 2013). Banca d’Italia. 2007. The Matrix Model. Unified Model for Statistical Data Representation and Processing. Available at: https

Open access
Supporting Book Search: A Comprehensive Comparison of Tags vs. Controlled Vocabulary Metadata

search applications such as book seller or library catalogs. Even Amazon relies on information about the book (metadata) more than the book content and complements its search functionality with additional features, such as a recommendation system based on purchase histories. This article explores the effectiveness of different book metadata elements in satisfying book search requests This text is an adapted and extended version of two conference papers: [ 5 ] and [ 6 ]. . Different types of metadata elements, such as bibliographic metadata, controlled vocabulary (CV

Open access
An Overview of the Use of GML in Modern Spatial Data Infrastructures

Geological Sciences", Computers & Geosciences, vol. 31, issue 9, pp. 1081-1094, Nov. 2005. Available: EBSCOhost, http://web.ebscohost.com [Accessed: Sept. 23, 2010]. http://web.ebscohost.com A. KalantariOskou'ee , M. S., "Geo-Metadata Creation Using GML technology", International Journal of Information Science and Technology, vol. 5 no. 2, pp. 47-65, July/December 2007. [Online]. Available: Scientific Information Database, http://www.sid.ir/en/index.asp. [Accessed: Sept. 23, 2010]. http

Open access