CitationResourcesExamples
{{#referencelist:
|references=van vuuren2013a;vanVuuren2013;Koskela:1990:PCS:100215;Denning:1991:CUA:102616|+sep=; |listtype=ol |browselinks=yes |columns=1 |header=All references
}} {{#scite: |reference=van vuuren2013a |type=journal-article |title=A new scenario framework for Climate Change Research: scenario matrix architecture |author=Detlef P. van Vuuren;Elmar Kriegler;Brian C. O’Neill;Kristie L. Ebi;Keywan Riahi;Timothy R. Carter;Jae Edmonds;Stephane Hallegatte;Tom Kram;Ritu Mathur;Harald Winkler|+sep=; |journal=Climatic Change |publisher=Springer Science + Business Media |year=2013 |volume=122 |issue=3 |pages=373-386 |doi=10.1007/s10584-013-0906-1 |subject=Atmospheric Science;Global and Planetary Change|+sep=; |issn=0165-0009;1573-1480|+sep=; }}
{{#scite: |bibtex=@article{vanVuuren2013, author="van Vuuren, Detlef P. and Kriegler, Elmar and O'Neill, Brian C.", title="A new scenario wiki", journal="Climatic Change", year="2014", volume="122", number="3", pages="373--386", abstract="This paper describes the scenario matrix architecture that underlies a framework for developing new scenarios for climate change research. The matrix architecture facilitates addressing key questions related to current climate research and policy-making: identifying the effectiveness of different adaptation and mitigation strategies (in terms of their costs, risks and other consequences) and the possible trade-offs and synergies. The two main axes of the matrix are: 1) the level of radiative forcing of the climate system (as characterised by the representative concentration pathways) and 2) a set of alternative plausible trajectories of future global development (described as shared socio-economic pathways). The matrix can be used to guide scenario development at different scales. It can also be used as a heuristic tool for classifying new and existing scenarios for assessment. Key elements of the architecture, in particular the shared socio-economic pathways and shared policy assumptions (devices for incorporating explicit mitigation and adaptation policies), are elaborated in other papers in this special issue.", issn="1573-1480", doi="10.1007/s10584-013-0906-2", url="http://dx.doi.org/10.1007/s10584-013-0906-1" } }} {{#scite:Byrne 2008
|type=journal |author=Byrne, A |year=2008 |title=Web 2.0 strategies in libraries and information services |journal=The Australian Library Journal |volume=57 |number=4 |pages=365-376 |citation text=Web 2.0 strategies in libraries and information services
}}
{{#scite: |bibtex=@book{Koskela:1990:PCS:100215, editor="Koskela, Rebecca and Simmons, Margaret", title = "Parallel Computer Systems: Performance Instrumentation and Visualization", year = "1990", isbn = {0-201-50937-7}, source = "ACM member price \$39.95, order number 704908", publisher = "ACM", address = "New York, NY, USA", } }} {{#scite: |bibtex= @book{Denning:1991:CUA:102616, editor = {Denning, Peter J.}, title = {Computers Under Attack: Intruders, Worms, and Viruses}, year = {1990}, isbn = {0-201-53067-8}, source = {ACM member price \$21.50, order number 706900}, publisher = {ACM}, address = {New York, NY, USA}, } }}