The increase in digitization of conventional books and other forms of print media suggests that d... more The increase in digitization of conventional books and other forms of print media suggests that digital or e-books are not a passing phenomenon. Present day digital library systems may have transformed the conventional processes into digital environment, however little development work has been done for the progression of traditional library business model in digital domain. Users of digital books want a more open environment where contents from different sources are made available seamlessly. Interoperability at device level, sharing, and a possibility of a convenient and useful annotation system are also general expectations from the standard user prospective. Publishers also need a system with efficient process workflow for the transformation of contents and its online availability. Besides the interoperability, the security and digital rights management is also a matter of concern for the digital content distributors. We started off our efforts by establishing system to present ...
When we look up information in the WWW we hope to find information that is correct, fitting in qu... more When we look up information in the WWW we hope to find information that is correct, fitting in quantity for our purposes and written at a level that we can understand. Unfortunately, very often one of the above criteria will not be met. A young person looking for information on some aspect of physics may well be frustrated when finding a complex formula whose understanding requires higher mathematics. In other cases, information may be much too voluminous or too short. This seems to indicate that what we need is presentation of material at various levels of detail and complexity. But most important of all, and this is what we are going to discuss in this paper is: how do we know that what we read is actually true? We will analyse this problem in the introductory section. We will show that it is impossible to expect "too much". We will argue that some improvements can be made, particularly if the domain is restricted. We will then examine certain types of geographical infor...
JUCS - Journal of Universal Computer Science, 2021
The Journal of Universal Computer Science is a monthly peer-reviewed open-access scientific journ... more The Journal of Universal Computer Science is a monthly peer-reviewed open-access scientific journal covering all aspects of computer science, launched in 1994, so becoming twenty-five years old in 2019. In order to celebrate its anniversary, this study presents a bibliometric overview of the leading publication and citation trends occurring in the journal. The aim of the work is to identify the most relevant authors, institutions, countries, and analyze their evolution through time. The article uses the Web of Science Core Collection citations and the ACM Computing Classification System in order to search for the bibliographic information. Our study also develops a graphical mapping of the bibliometric material by using the visualization of similarities (VOS) viewer. With this software, the work analyzes bibliographic coupling, citation and co-citation analysis, co-authorship, and co-occurrence of keywords. The results underline the significant growth of the journal through time and...
J.UCS The Journal of Universal Computer Science, 1996
: In this paper we make a first attempt at systematically investigating levelsof anonymity requir... more : In this paper we make a first attempt at systematically investigating levelsof anonymity required in networked computer systems: we feel it is often overlookedthat beyond such obvious cases as identified by means of a password" or "anonymoususe" there are many other levels of anonymity, identification and authenticity necessaryin various applications.Key Words: security, anonymous use, access control, authentication, big brotherCategory:
In this thesis, possibilities are studied how session-oriented services on the Internet can be ma... more In this thesis, possibilities are studied how session-oriented services on the Internet can be made accessible to users of client programs that use a connectionless application-level protocol. The concepts and properties of two Hypermedia Information Systems, the World-Wide Web (WWW) and Hyper-G, are described and a comparison between these two systems is given. A gateway program was developed which is used as a protocol converter between the sessionoriented Hyper-G client-server protocol and the connectionless Hypertext Transfer Protocol (HTTP). A mechanism was implemented that allows to differentiate HTTP requests and to assign them to Hyper-G sessions. The gateway provides users of World-Wide Web clients with session-oriented access to information residing on Hyper-G servers. Table of Contents 1. Introduction...............................................................................................................1 2. The World-Wide Web ..........................................
The Web has caused a revolution of how we can access information today, how we easily get answers... more The Web has caused a revolution of how we can access information today, how we easily get answers to many problems, and how we learn. However, there are three issues that are often overlooked. First, it is not easy to extrapolate current developments into the future: we will be in for many more surprises than we think. Second, as fast as the Web has developed, other technologies have developed still faster and their impact on society may be just as significant. Third, one must not overlook that the Web also has some inherent dangers that are more and more emerging. With all enthusiasm we have for the Web, we should also be aware of some of the subtle and some of the not so subtle dangers.In this paper, I will address the first two issues in the introduction, and devote the rest of the paper to some of the perceived dangers of the Web. One example is the loss of privacy (due to many organisations collecting detailed profiles on all of us, but also on organisations, economic developme...
Die ZBW räumt Ihnen als Nutzerin/Nutzer das unentgeltliche, räumlich unbeschränkte und zeitlich a... more Die ZBW räumt Ihnen als Nutzerin/Nutzer das unentgeltliche, räumlich unbeschränkte und zeitlich auf die Dauer des Schutzrechts beschränkte einfache Recht ein, das ausgewählte Werk im Rahmen der unter
The increase in digitization of conventional books and other forms of print media suggests that d... more The increase in digitization of conventional books and other forms of print media suggests that digital or e-books are not a passing phenomenon. Present day digital library systems may have transformed the conventional processes into digital environment, however little development work has been done for the progression of traditional library business model in digital domain. Users of digital books want a more open environment where contents from different sources are made available seamlessly. Interoperability at device level, sharing, and a possibility of a convenient and useful annotation system are also general expectations from the standard user prospective. Publishers also need a system with efficient process workflow for the transformation of contents and its online availability. Besides the interoperability, the security and digital rights management is also a matter of concern for the digital content distributors. We started off our efforts by establishing system to present ...
When we look up information in the WWW we hope to find information that is correct, fitting in qu... more When we look up information in the WWW we hope to find information that is correct, fitting in quantity for our purposes and written at a level that we can understand. Unfortunately, very often one of the above criteria will not be met. A young person looking for information on some aspect of physics may well be frustrated when finding a complex formula whose understanding requires higher mathematics. In other cases, information may be much too voluminous or too short. This seems to indicate that what we need is presentation of material at various levels of detail and complexity. But most important of all, and this is what we are going to discuss in this paper is: how do we know that what we read is actually true? We will analyse this problem in the introductory section. We will show that it is impossible to expect "too much". We will argue that some improvements can be made, particularly if the domain is restricted. We will then examine certain types of geographical infor...
JUCS - Journal of Universal Computer Science, 2021
The Journal of Universal Computer Science is a monthly peer-reviewed open-access scientific journ... more The Journal of Universal Computer Science is a monthly peer-reviewed open-access scientific journal covering all aspects of computer science, launched in 1994, so becoming twenty-five years old in 2019. In order to celebrate its anniversary, this study presents a bibliometric overview of the leading publication and citation trends occurring in the journal. The aim of the work is to identify the most relevant authors, institutions, countries, and analyze their evolution through time. The article uses the Web of Science Core Collection citations and the ACM Computing Classification System in order to search for the bibliographic information. Our study also develops a graphical mapping of the bibliometric material by using the visualization of similarities (VOS) viewer. With this software, the work analyzes bibliographic coupling, citation and co-citation analysis, co-authorship, and co-occurrence of keywords. The results underline the significant growth of the journal through time and...
J.UCS The Journal of Universal Computer Science, 1996
: In this paper we make a first attempt at systematically investigating levelsof anonymity requir... more : In this paper we make a first attempt at systematically investigating levelsof anonymity required in networked computer systems: we feel it is often overlookedthat beyond such obvious cases as identified by means of a password" or "anonymoususe" there are many other levels of anonymity, identification and authenticity necessaryin various applications.Key Words: security, anonymous use, access control, authentication, big brotherCategory:
In this thesis, possibilities are studied how session-oriented services on the Internet can be ma... more In this thesis, possibilities are studied how session-oriented services on the Internet can be made accessible to users of client programs that use a connectionless application-level protocol. The concepts and properties of two Hypermedia Information Systems, the World-Wide Web (WWW) and Hyper-G, are described and a comparison between these two systems is given. A gateway program was developed which is used as a protocol converter between the sessionoriented Hyper-G client-server protocol and the connectionless Hypertext Transfer Protocol (HTTP). A mechanism was implemented that allows to differentiate HTTP requests and to assign them to Hyper-G sessions. The gateway provides users of World-Wide Web clients with session-oriented access to information residing on Hyper-G servers. Table of Contents 1. Introduction...............................................................................................................1 2. The World-Wide Web ..........................................
The Web has caused a revolution of how we can access information today, how we easily get answers... more The Web has caused a revolution of how we can access information today, how we easily get answers to many problems, and how we learn. However, there are three issues that are often overlooked. First, it is not easy to extrapolate current developments into the future: we will be in for many more surprises than we think. Second, as fast as the Web has developed, other technologies have developed still faster and their impact on society may be just as significant. Third, one must not overlook that the Web also has some inherent dangers that are more and more emerging. With all enthusiasm we have for the Web, we should also be aware of some of the subtle and some of the not so subtle dangers.In this paper, I will address the first two issues in the introduction, and devote the rest of the paper to some of the perceived dangers of the Web. One example is the loss of privacy (due to many organisations collecting detailed profiles on all of us, but also on organisations, economic developme...
Die ZBW räumt Ihnen als Nutzerin/Nutzer das unentgeltliche, räumlich unbeschränkte und zeitlich a... more Die ZBW räumt Ihnen als Nutzerin/Nutzer das unentgeltliche, räumlich unbeschränkte und zeitlich auf die Dauer des Schutzrechts beschränkte einfache Recht ein, das ausgewählte Werk im Rahmen der unter
Uploads
Papers by Hermann Maurer