<--- Back to Details
First PageDocument Content
Library 2.0 / Library science / Information science / Computing / Functional Requirements for Bibliographic Records / FRBRoo / Barbara Tillett / Cataloging / WEMI / Library catalog / XC / Data model
Date: 2015-12-07 14:21:59
Library 2.0
Library science
Information science
Computing
Functional Requirements for Bibliographic Records
FRBRoo
Barbara Tillett
Cataloging
WEMI
Library catalog
XC
Data model

FRBR, Before and After: A Look at Our Bibliographic Models

Add to Reading List

Source URL: kcoyle.net

Download Document from Source Website

File Size: 596,67 KB

Share Document on Facebook

Similar Documents

Algebra / Linear algebra / Mathematics / Matrices / Numerical linear algebra / Unitary matrix / Matrix / Rotational symmetry / Four-vector / Permutation matrix / Eigenvalue perturbation / Singular value decomposition

CS378, MA375T, PHY341 Homework 1 Homework 1 Introduction to Quantum Information Science

DocID: 1xVZC - View Document

Algebra / Quantum mechanics / Physics / Quantum information science / Quantum states / Linear algebra / Quantum computing / 0I / Quantum circuit / Eigenvalues and eigenvectors / Qubit / Eigenvalue perturbation

CS378, MA375T, PHY341 Homework 2 Homework 2 Introduction to Quantum Information Science

DocID: 1xVYW - View Document

Health / Medicine / Global health / Epidemiology / Biological weapons / Tropical diseases / Zoonoses / Ebola virus disease / World Health Organization / Pandemic / Public health / Infection

GOV200X – The Politics of Plague Worcester Polytechnic Institute Social Science and Policy Studies Department Sample Syllabus Course Information Professor Patricia Stapleton

DocID: 1xVN2 - View Document

Computing / Free software / Dark web / Internet / Cryptographic protocols / Internet Standards / Computer network security / Tor / .onion / Botnet / Internet privacy / Bipartite graph

HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

DocID: 1xVHD - View Document

Security engineering / Cyberwarfare / Computing / Nadia Heninger / Transport Layer Security / Cryptography / E-commerce / Secure communication / Heninger / Alex Halderman / Association for Computing Machinery / DROWN attack

Shaanan N Cohney , https://cohney.info , Updated 16 September 2018 EDUCATION & WORK PhD Computer and Information Science Computer and Information Security

DocID: 1xVEY - View Document