Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information wants someone else to pay for it: Laws of information economics and scholarly publishing., and . Inf. Services and Use, 35 (1-2): 57-70 (2015)Beyond authorship: attribution, contribution, collaboration, and credit., , , , and . Learn. Publ., 28 (2): 151-155 (2015)An Overview of Data-PASS Shared Catalog.. IASSIST Conference, IASSIST, (2007)Selecting efficient and reliable preservation strategies: modeling long-term information integrity using large-scale hierarchical discrete event simulation., and . CoRR, (2019)Formalizing Privacy Laws for License Generation and Data Repository Decision Automation., , and . CoRR, (2019)The DataWeb/VDC integration., and . IASSIST Conference, IASSIST, (2005)A Digital Library for the Dissemination and Replication of Quantitative Social Science Research: The Virtual Data Center, , , , , , and . Social Science Computer Review, 19 (4): 458-470 (2001)Trends in Digital Preservation Capacity and Practice: Results from the 2nd Bi-annual National Digital Stewardship Alliance Storage Survey., , , , and . D Lib Mag., (2017)Public Participation GIS: The Case of Redistricting., and . HICSS, page 2063-2072. IEEE Computer Society, (2014)Selecting Efficient and Reliable Preservation Strategies., and . Int. J. Digit. Curation, 15 (1): 1-18 (2020)