Results 81 to 90 of about 23,388 (326)

Do we really need to catch them all? A new User-guided Social Media Crawling method

open access: yes, 2017
With the growing use of popular social media services like Facebook and Twitter it is challenging to collect all content from the networks without access to the core infrastructure or paying for it.
Boldt, Martin   +3 more
core   +2 more sources

Trauma‐Informed Practice in Welfare‐to‐Work and Employment Services: A Scoping Review

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT There is increasing recognition within welfare services, including employment services, that many participants may have histories of trauma. Research suggests that experiences of trauma not only impact individuals' psychosocial health but also vocational elements such as job performance, employability, career progression, and financial ...
Emily Corbett   +3 more
wiley   +1 more source

Technostress: A Technology-Enhanced Literature Review

open access: yesApplied Medical Informatics, 2021
Background: Technostress is defined as stress or psychosomatic illness caused by working with computer technology on a daily basis. The worldwide COVID-19 pandemic restrictions and measures as computer-based working and computer-assisted education ...
Ariana-Anamaria CORDOŞ   +2 more
doaj  

Polyethylene Melt Rupture and Slip in Simple Shear: A Visual and Mechanistic Study

open access: yesJournal of Applied Polymer Science, EarlyView.
Slip velocity transient curve (left) with images of the specimen at different times during a simple shear experiment. On the right, schematics illustrate the sample and its side view before and after simple shear. ABSTRACT Melt rupture of a bimodal molecular weight distribution polyethylene is studied under simple shear via flow visualization ...
Mohammadali Sattari   +2 more
wiley   +1 more source

PathMarker: protecting web contents against inside crawlers

open access: yesCybersecurity, 2019
Web crawlers have been misused for several malicious purposes such as downloading server data without permission from the website administrator. Moreover, armoured crawlers are evolving against new anti-crawler mechanisms in the arm races between crawler
Shengye Wan, Yue Li, Kun Sun
doaj   +1 more source

Website Application Security Scanner Using Local File Inclusion and Remote File Inclusion [PDF]

open access: yes, 2012
Today many web-based applications developed to be accessible via the internet. The problem that often occurs is commonly found on web application vulnerabilities.
Gunawan, Ibnu   +2 more
core  

Dr. Hans Kohn and the political takeover of the Berlin Medical Society by the National Socialist regime in 1933

open access: yesThe Anatomical Record, EarlyView.
Abstract To solidify their power over society, totalitarian regimes will usually eliminate any dissent, any perceived threats early on. These threats include not only political enemies but also educated and independent segments of society, such as professional associations.
Michael Hortsch
wiley   +1 more source

Generating and visualizing a soccer knowledge base [PDF]

open access: yes, 2006
This demo abstract describes the SmartWeb Ontology-based Information Extraction System (SOBIE). A key feature of SOBIE is that all information is extracted and stored with respect to the SmartWeb ontology.
Buitelaar, Paul   +9 more
core  

Usage of the term provenance in LIS literature: An Annual Review of Information Science and Technology (ARIST) paper

open access: yesJournal of the Association for Information Science and Technology, EarlyView.
Abstract Provenance is the story of how something has come to be. In this paper, we provide a systematic literature review to categorize the various notions of provenance in Information Sciences. The goal of this review is to paint a broader picture of the multiple uses of provenance at play and to enhance our understanding of the importance of ...
Rhiannon Bettivia   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy