Skip to main content

Items where Subject is "Z Bibliography. Library Science. Information Resources > ZA Information resources"

Group by: Creator's name | Item Type | Date | No Grouping
Jump to: B | E | G | J | L | M | S | Z
Number of items at this level: 11.

B

Branca, Bernardino (2019) The Edgar Wind Archive at the Bodleian Library, Oxford. In: SAS Centre for Memory Studies: Memory and Archives Seminar, 12 November 2019, Senate House, University College London. (Unpublished) (KAR id:81450)
[thumbnail of WindArchiveBodleianLibraryNoPicturesKAR.pdf]
Preview

E

Edwards, Katie and Cooper, Helen and Caplehorne, Josie and Bass, Rosalyn and Waller, Clair (2018) Research report for supporting practice research works (P1623, 2.2). Project report. University of Kent, Kent, UK 10.22024/UniKent/01.02.70577. (Unpublished) (doi:10.22024/UniKent/01.02.70577) (KAR id:70577)
[thumbnail of 2.2 Research report of best practice.pdf]
Preview
[thumbnail of 2.2 Research report of best practice.docx]

G

Gustafsson, Robin, Kuusi, Osmo, Meyer, Martin S. (2015) Examining open-endedness of expectations in emerging technological fields: The case of cellulosic ethanol. Technological Forecasting and Social Change, 91 . pp. 179-193. (doi:10.1016/j.techfore.2014.02.008) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:38638)
[thumbnail of 1-s2.0-S0040162514000572-main.pdf__tid=2b9da978-b952-11e4-aeb1-00000aacb362&acdnat=1424472509_a409847efb7d8ac0edc4b3d2f2e52dec]

J

Jordanous, Anna (2015) Enhancing information retrieval and resource discovery from data using the Semantic Web. In: 4th International Symposium on Emerging Trends and Technologies in Libraries and Information Services, 6-8 Jan 2015, Noida, UP, India. (KAR id:46568)
[thumbnail of ETTLIS2015-AJordanous.doc]

L

Lu, Yang, Sinnott, Richard O. (2016) Semantic Security for E-Health: A Case Study in Enhanced Access Control. In: 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom). . pp. 407-414. IEEE ISBN 978-1-4673-7212-1. E-ISBN 978-1-4673-7211-4. (doi:10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.90) (KAR id:80963)
[thumbnail of 2. Semantic Security for e-Health- A Case Study in Enhanced Access Control.pdf]
Preview

Lu, Yang, Sinnott, Richard O. (2018) Semantic privacy-preserving framework for electronic health record linkage. Telematics and Informatics, 35 (4). pp. 737-752. ISSN 0736-5853. (doi:10.1016/j.tele.2017.06.007) (KAR id:80957)
[thumbnail of 5. Semantic privacy-preserving framework for electronic healthrecord linkage.pdf]
Preview

Lu, Yang, Sinnott, Richard O. (2016) Semantic-Based Privacy Protection of Electronic Health Records for Collaborative Research. In: 2016 IEEE Trustcom/BigDataSE/ISPA. . pp. 519-526. IEEE ISBN 978-1-5090-3206-8. E-ISBN 978-1-5090-3205-1. (doi:10.1109/TrustCom.2016.0105) (KAR id:80962)
[thumbnail of 3. Semantic-based Privacy Protection of Electronic Health Records for Collaborative Research.pdf]
Preview

Lu, Yang, Sinnott, Richard O., Verspoor, Karin (2017) A Semantic-Based K-Anonymity Scheme for Health Record Linkage. Studies in Health Technology and Informatics, 239 . pp. 84-90. ISSN 0926-9630. (doi:10.3233/978-1-61499-783-2-84) (KAR id:80964)
[thumbnail of 4. A Semantic-based K-anonymity Scheme for Health Record Linkage.pdf]
Preview

M

Mahaini, Mohamad Imad, Li, Shujun, Sağlam, Rahime Belen (2019) Building Taxonomies based on Human-Machine Teaming: Cyber Security as an Example. In: ICPS: ACM International Conference Proceeding Series. Proceedings of the 14th International Conference on Availability, Reliability and Security. . ACM ISBN 978-1-4503-7164-3. (doi:10.1145/3339252.3339282) (KAR id:75253)
[thumbnail of paper_151.pdf]
Preview

S

Slowe, Sarah, Cole, Gareth (2018) DOI’s for Book Chapters? In: UNSPECIFIED. (Unpublished) (KAR id:68485)
[thumbnail of DOI for bookchapters v5.ppsx]

Z

Zeitlyn, David, Bex, Jane, David, Mathew (1998) Access denied: the politics of new communications media. Telematics And Informatics, 15 (3). pp. 219-230. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:3692)

This list was generated on Mon Oct 25 22:54:10 2021 BST.