NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Li, Jieyu; Huang, Chunlan; Wang, Xiuhong; Wu, Shengli – Information Research: An International Electronic Journal, 2016
Introduction: In the big data age, we have to deal with a tremendous amount of information, which can be collected from various types of sources. For information search systems such as Web search engines or online digital libraries, the collection of documents becomes larger and larger. For some queries, an information search system needs to…
Descriptors: Search Engines, Data Processing, Database Management Systems, Data
Ehrsam, Hank – School Business Affairs, 2012
Paying for employee turnover costs, data storage, and multiple layers of benefits can be difficult for fiscally constrained institutions, especially as budget cuts and finance-limiting legislation abound in school districts across the country. Many traditional paper-based systems have been replaced with automated, software-based services, helping…
Descriptors: Personnel Management, Human Resources, Redundancy, Program Improvement
Peer reviewed Peer reviewed
Direct linkDirect link
Mitchell, Erik – Journal of Web Librarianship, 2010
The author recently created a presentation using HTML5 based on a tutorial put together by Marcin Wichary. The example presentation is part proof-of-concept, part instructional piece, and it is part of a larger site on HTML5 and how one can use it to create rich Web-based applications. The more he delved into HTML5, the more he found that it was…
Descriptors: Internet, Programming Languages, Programming, Computer System Design
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ivan, Ion; Ciurea, Cristian; Pavel, Sorin – Journal of Applied Quantitative Methods, 2010
The collaborative system with finite number of states is defined. A very large database is structured. Operations on large databases are identified. Repetitive procedures for collaborative systems operations are derived. The efficiency of such procedures is analyzed. (Contains 6 tables, 5 footnotes and 3 figures.)
Descriptors: Foreign Countries, Cooperation, Databases, Efficiency
Edwards, Gregory – ProQuest LLC, 2011
Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…
Descriptors: Strategic Planning, National Security, Information Systems, Social Change