Search results

1 – 6 of 6
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 1 March 1996

Roberto Cipolla, Nicholas Hollinghurst, Andrew Gee and Robert Dowland

Computer vision provides many opportunities for novel man‐machine interfaces. Pointing and face gestures can be used as a simple, passive means of interfacing with computers and…

607

Abstract

Computer vision provides many opportunities for novel man‐machine interfaces. Pointing and face gestures can be used as a simple, passive means of interfacing with computers and robots. We describe two novel algorithms to track the position and orientation of the user’s hand or face in video images. This information is used to determine where the hand or face is pointing. This can be used in interactive robotics to allow a user with manipulation disabilities or working in hazardous environments to guide a robot manipulator to pick up a simple object of interest.

Details

Assembly Automation, vol. 16 no. 1
Type: Research Article
ISSN: 0144-5154

Keywords

Access Restricted. View access options
Article
Publication date: 1 March 1974

Frances Neel Cheney

Communications regarding this column should be addressed to Mrs. Cheney, Peabody Library School, Nashville, Tenn. 37203. Mrs. Cheney does not sell the books listed here. They are…

300

Abstract

Communications regarding this column should be addressed to Mrs. Cheney, Peabody Library School, Nashville, Tenn. 37203. Mrs. Cheney does not sell the books listed here. They are available through normal trade sources. Mrs. Cheney, being a member of the editorial board of Pierian Press, will not review Pierian Press reference books in this column. Descriptions of Pierian Press reference books will be included elsewhere in this publication.

Details

Reference Services Review, vol. 2 no. 3
Type: Research Article
ISSN: 0090-7324

Access Restricted. View access options
Article
Publication date: 30 May 2008

Leo‐Paul Dana, Aldene Meis‐Mason and Robert B. Anderson

To learn how Inuvialuit people feel about the oil and gas activities on their land.

1074

Abstract

Purpose

To learn how Inuvialuit people feel about the oil and gas activities on their land.

Design/methodology/approach

Interviews were administered to a stratified sample, on Inuvialuit land. Participants included: Inuvialuit elders; entrepreneurs; public servants; employees of the private sector; managers of oil companies; unemployed persons; housewives; the mayor of Inuvik; and the first aboriginal woman leader in Canada.

Findings

It was reported that oil and gas industry activities are having a positive impact on the regional economy, creating indirect as well as direct financial benefits for the Inuvialuit among others. However, some residents qualified their support saying that they are in favour of continued activity only if benefits filter to them as opposed to being enjoyed only by oil companies and migrant employees. Concern was also expressed for the environment and for the threat that development brings to wildlife upon which people rely on as a food source.

Research limitations/implications

This study should have a longitudinal follow‐up.

Practical implications

While oil and gas exploration and the building of a pipeline may have economic advantages, this might have social, cultural and environment costs for the Inuvialuit.

Originality/value

The paper illustrates how oil and gas activities on Inuvialuit land will transform the lives of these people.

Details

Journal of Enterprising Communities: People and Places in the Global Economy, vol. 2 no. 2
Type: Research Article
ISSN: 1750-6204

Keywords

Access Restricted. View access options
Article
Publication date: 1 May 1961

The news that the Ministry of Education has set up two Working Parties in connection with the proposed new Public Libraries Bill is welcome and gives further hope that such a Bill…

38

Abstract

The news that the Ministry of Education has set up two Working Parties in connection with the proposed new Public Libraries Bill is welcome and gives further hope that such a Bill will appear in the not too distant future. From the constitutions of these Working Parties, which seem to us to be fairly representative of all interests, it would appear that the first is going to concern itself with the main aspects of the Roberts Report recommendations, while the second will be given the task of studying the problems of library co‐operation. On the first party, county libraries are represented by Miss Paulin and Mr. Budge, while Wales is represented by Mr. A. Edwards, librarian of the Cardiganshire and Aberystwyth Joint Library. Mr. D. I. Colley, the city librarian of Manchester, will be keeping a watching brief on behalf of the large libraries, but it should not be forgotten that he is also a member of the Libraries Committee of the Association of Municipal Corporations. Mr. Gardner is rightly there, perhaps not only as librarian of Luton but also as chairman of the Library Association's Executive Committee. The Smaller Libraries Group can surely have no complaints, for out of the ten members of Working Party No. I there are three librarians from smaller libraries, these being Mr. Helliwell of Winchester, Mr. Christopher of Penge and Mr. Parker of Ilkley. This Working Party is completed by two legal representatives in Mr. W. B. Murgatroyd, who is Town Clerk of Hornsey, and Mr. J. H. Oldham, who is Assistant County Solicitor for Kent.

Details

New Library World, vol. 62 no. 11
Type: Research Article
ISSN: 0307-4803

Access Restricted. View access options
Article
Publication date: 1 May 1969

THERE has recently sprung up a great interest in antiques, probably due to Arthur Negus and his TV and broadcast programmes, and perhaps it is this which has made county…

45

Abstract

THERE has recently sprung up a great interest in antiques, probably due to Arthur Negus and his TV and broadcast programmes, and perhaps it is this which has made county librarians also, think about their past and their beginnings. Gloucestershire was the first to become aware of the fact that its library was fifty years old, and that a genuine antique, in the shape of its first librarian, still existed and could be questioned about the early days. So in December, 1967, the Gloucestershire Library Committee staged a most successful 50th birthday party, and invited me to cut the birthday cake, on which were 50 candles! And a very great occasion it was.

Details

New Library World, vol. 70 no. 11
Type: Research Article
ISSN: 0307-4803

Access Restricted. View access options
Article
Publication date: 1 August 2006

G.B. Magklaras, S.M. Furnell and P.J. Brooke

This paper presents the process of constructing a language tailored to describing insider threat incidents, for the purposes of mitigating threats originating from legitimate…

1246

Abstract

Purpose

This paper presents the process of constructing a language tailored to describing insider threat incidents, for the purposes of mitigating threats originating from legitimate users in an IT infrastructure.

Design/methodology/approach

Various information security surveys indicate that misuse by legitimate (insider) users has serious implications for the health of IT environments. A brief discussion of survey data and insider threat concepts is followed by an overview of existing research efforts to mitigate this particular problem. None of the existing insider threat mitigation frameworks provide facilities for systematically describing the elements of misuse incidents, and thus all threat mitigation frameworks could benefit from the existence of a domain specific language for describing legitimate user actions.

Findings

The paper presents a language development methodology which centres upon ways to abstract the insider threat domain and approaches to encode the abstracted information into language semantics. The language construction methodology is based upon observed information security survey trends and the study of existing insider threat and intrusion specification frameworks.

Originality/value

This paper summarizes the picture of the insider threat in IT infrastructures and provides a useful reference for insider threat modeling researchers by indicating ways to abstract insider threats.

Details

Information Management & Computer Security, vol. 14 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

1 – 6 of 6
Per page
102050