|
|
Creator | Title | Description | Subject | Date |
26 |
|
Silverman, Randall H. | Litany of "terrible, no good, very bad" things that can happen after the disaster | This paper summarizes post-disaster dangers that can threaten the well-being of recovery workers. These include the structural stability of damaged buildings, electrical risks, the presence of hazardous materials and collections in the work area, and biological hazards. Issues that need to be assess... | Library materials, Conservation and restoration; Emergency management; Disaster relief, Research | 2004-05-21 |
27 |
|
Riloff, Ellen M. | Automatically constructing a dictionary for information extraction tasks | Knowledge-based natural language processing systems have achieved good success with certain tasks but they are often criticized because they depend on a domain-specific dictionary that requires a great deal of manual knowledge engineering. This knowledge engineering bottleneck makes knowledge-based ... | Information extraction; Dictionary construction; Knowledge-based systems; AutoSlog; Domain-specific dictionary | 1993 |
28 |
|
Silverman, Randall H. | Disaster recovery in the artifact fields - Mississippi after Hurricane Katrina | From 22-29 September 2005 HEART, one of eight Heritage Emergency Assistance Recovery Teams, arrived in Mississippi to assess collection damage to cultural institutions following Hurricane Katrina. | Preservation; Hurricane Katrina | 2005-12 |
29 |
|
Arlitsch, Kenning | Digitizing Sanborn fire insurance maps for a full color, publicly-accessible collection | Describes the digitization of 1300 full-color Sanborn Fire Insurance Maps at the University of Utah's Marriott Library. Issues of copyright, digitization specifications, digital asset management system (CONTENTdm), and web presentation are discussed. | Digitization of library materials; Fire insurance maps | 2002-07 |
30 |
|
Mitchell, Joyce A. | The creation and early implementation of a high speed fiber optic network for a university health sciences center | In late 1989 the University of Missouri Health Sciences Center began the process of creating an extensive fiber optic network throughout its facilities, with the intent to provide networked computer access to anyone in the Center desiring such access, regardless of geographic location or organizatio... | | 1991-01-01 |
31 |
|
Harrison, Reid R. | Fly like a fly | THIS FALL, several biologist colleagues of mine plan to build a movie theater for houseflies. In fact, it's a miniature IMAX theater-complete with a panoramic screen-inside of which they'll place a tiny rotating cage, a downsized version of the ones that astronauts use to simulate tumbling in spa... | | 2005 |
32 |
|
Silverman, Randall H. | Tsunami and Archives: The Unexpected Possibilities; Jakarta, Indonesia 17-18 July 2006 | The International Gathering on Tsunami and Archives, sponsored by the National Archives of the Republic of Indonesia (ANRI) and the International Council on Archives (ICA), was held in Jakarta, Indonesia 17-18 July 2006. The event was conducted in English and Indonesian and provided a venue for arch... | Natural disasters; Tsunami; Preservation; Book repair | 2007 |
33 |
|
Wehrli, Robert | ARCAID: The ARChitects computer graphics AID | ARCAID?The ARChitect's Computer Graphics AID?is one part of a two-part research program at the University of Utah under the direction of David C. Evans. ARCAID is a specification for the organization of computer processes including data and procedures for the use of architects, engineers, and other... | ARCAID | 1970 |
34 |
|
Riloff, Ellen M. | Corpus-based bootstrapping algorithm for semi-automated semantic lexicon construction | Many applications need a lexicon that represents semantic information but acquiring lexical information is time consuming. We present a corpus-based bootstrapping algorithm that assists users in creating domain-specifi c semantic lexicons quickly. Our algorithm uses a representative text corpus for ... | Bootstrapping algorithm; Lexicon construction | 1999-06 |
35 |
|
Diener, Marissa L. | Gift from the gods: a Balinese guide to early child rearing | The influence of Western schools and other imports notwithstanding, many child-rearing practices recorded earlier in the century [in Indonesia] are still observable, especially those concerning infants and young children. For the "manual" that follows, I propose as the fictive author a male healer, ... | Children; Bali; Infants; Child rearing manuals | 2000 |
36 |
|
Lenart, Joshua Bela | The Blue Castle project: a feasibility study of the proposed nuclear power plant in Emery County, Utah along the Green River | With an increasing population in Utah, specifically in the Salt Lake Valley, the demand for energy is rapidly growing each year. Currently, Utah's electric grid is largely produced by burning coal, natural gas, and other fossil fuels. In the past, supplying Utahns with electricity from these forms h... | Blue Castle; Utah; Nuclear power plant; Emery County | 2015-08 |
37 |
|
Cline, Nicole L. | Markets of sorrow, labors of faith | The United States Constitution was written with the expectation that our government officials serve with integrity. Normative theory of public administration is grounded through the oath of office to uphold the Constitution. When people in the U. S. become victims of catastrophic events, they expect... | | 2013-01-01 |
38 |
|
Silverman, Randall H. | Litany of 'terrible, no good, very bad' things that can happen after the disaster | On average, 464 disasters occur each year in all parts of the globe. Some are more catastrophic than others; research reveals that excluding drought, famine and war, approximately 197 take place in Asia, 111 in the Americas, 77 in Europe, 61 in Africa, and 18 in Oceania. As a result, 50,000 people a... | | 2004 |
39 |
|
Lombardo, Nancy T.; Morrow, Anne; Le Ber, Jeanne M. | Rethinking mobile delivery: using quick response codes to access information at point of need | This paper covers the use of Quick Response (QR) Codes to provide instant mobile access to information, digital collections, educational offerings, the library website, subject guides, text messages, videos, and personnel in the library. The array of uses and the value of using QR Codes to push c... | library services, mobile delivery, point of need access, QR codes | 2012 |
40 |
|
Furse, Cynthia M. | Statistical comparison of capacity predictions for realistic MIMO channels | The impact of antenna polarization on channel capacity is explored in multiple-input, multiple-output (MIMO) systems. An idealized polarization model involving branch power rations (BPR's) and channel cross-coupling is incorporated into channel-specific capacity calculations. Results are compared f... | | 2007-01-01 |
41 |
|
Chamberlin, Ralph V. | The black widow spider and its varieties in the United States | The spiders of the genus Latrodectus, a member of the family Theridiidae, popularly known as the line-weavers or comb-footed spiders, are of world-wide distribution in tropical and sub-tropical latitudes. The genus " comprises those very interesting spiders which, under various local names, have bee... | | 1935-06 |
42 |
|
Silverman, Randall H. | Day the university changed | Describes the disaster recovery efforts in the Morgan Library of Colorado State University following the 1997 flood. Deals in detail with conservation and restoration of damaged book and journal collections. | Library materials, Conservation; Library Materials, Restoration; Flood damage; Emergency management | 2003 |
43 |
|
Brown, Barbara B.; Werner, Carol M. | Walkable route perceptions and physical features: converging evidence for en-route walking experiences | Guided walks near a light rail stop in downtown Salt Lake City, UT, were examined using a 2 (gender) x 3 (route walkability: low, mixed, or high walkability features) design. Trained raters confirmed that more walkable segments had more traffic, environmental and social safety; pleasing aesthetics;... | Guided walks; Walkability; Environmental aesthetics; Urban environment; Incivilities; Salt Lake City | 2007-01-01 |
44 |
|
Anderson, Richard Bryan | The crisis in research librarianship | | | 2011 |
45 |
|
Landesman, Margaret M. | History of pioneer: Utah's online library | Text of a speech given by the author on October 4, 2001, at the Nevada Library Association Annual Convention. | Libraries; Online Library catalogs; Library Resources | 2001-10-04 |
46 |
|
Landesman, Margaret M. | Libraries investing in the future first - some practical suggestions | Muddling through is what we mostly do most of the time. It is a reasonable strategy for bridging the gap between present resources and future expectations--providing expectations are in a reliably upward direction. | | 2004 |
47 |
|
Malloy, Thomas E. | Logic of logic and the logic of dreams. | For Bateson explanation is the mapping of description onto tautology. "An explanation has to provide something more than a description provides, and in the end, an explanation appeals to a tautology, which as I have defined it, is a body of propositions so linked together that the links between the ... | Science; Psychology; Dreams | 2006-02 |
48 |
|
Christensen, Douglas A. | Effects of increased energy prices on U.S. agriculture: an econometric approach | Although the contents of this manuscript remain the responsibility of the authors, we wish to thanks a group of reviewers for the time and conscientious effort they put forth to solidify this final draft. Andrew Morton, Brian Holding, Wesley Buchele, and Arnold Paulsen deserve much credit for their ... | Energy prices | 1981 |
49 |
|
Pataki, Diane | University of Utah Red Butte Creek Strategic Vision | A vision for Red Butte Creek at the University of Utah, developed by a RBC Strategic Vision Steering Committee led by Diane Pataki, Biology department. | Red Butte Creek; University of Utah; Planning | 2016 |
50 |
|
Kasera, Sneha K. | Violating privacy through walls by passive monitoring of radio windows | We investigate the ability of an attacker to passively use an otherwise secure wireless network to detect moving people through walls. We call this attack on privacy of people a "monitoring radio windows" (MRW) attack. We design and implement the MRW attack methodology to reliably detect when a pers... | | 2014-01-01 |