GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Distributed artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (197 pages)
    Edition: 1st ed.
    ISBN: 9783662490174
    Series Statement: Lecture Notes in Computer Science Series ; v.9380
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Transactions on Computational Collective Intelligence -- Contents -- Management and Computer Science Synergies: A Theoretical Framework for Context Sensitive Simulation Environment -- 1 Introduction -- 2 The Proposition of a Theoretical Model -- 2.1 A Review of the Literature -- 2.2 The Model and Research Hypotheses -- 3 Hypotheses Validation Methodology of the Proposed Model: SEM -- 4 Methodology to Build Context Sensitive Simulation Environment: Fuzzy Data Analysis -- 4.1 Fuzzy Clustering -- 4.2 Fuzzy Rules Extraction -- 5 The Simulation Environment -- 6 Related Works -- 7 Conclusions and Future Works -- References -- Improved Recommendation System Using Friend Relationship in SNS -- Abstract -- 1 Introduction -- 2 Recommended Types of Social Networks -- 2.1 The Representation and the Characteristics of Social Network Data -- 2.2 Recommended Items Based on Social Networks -- 2.3 Recommend of SNS Friends -- 3 Improved Recommendation of SNS Friends: Matrix Decomposition Model on Context -- 3.1 The Introduction of Matrix Decomposition Model -- 3.2 Improved Model -- 4 Experiment and Analysis -- 4.1 A Set of Training Data -- 4.2 Evaluation Standards -- 4.3 The Results of Experiment -- 5 Summary -- References -- Bidirectional Analysis Method of Static XSS Defect Detection Technique Based On Database Query Language -- 1 Introduction -- 2 Reverse XSS Defect Detection Theory -- 2.1 Domains of XSS Defect Description -- 2.2 Relations of XSS Defect Detection -- 2.3 Reverse Semantic Analysis Rules of XSS Defect Detection -- 2.4 Bidirectional Taint Propagation Analysis Approach -- 3 Implementation of Reverse Static Detection on XSS Defect -- 3.1 Pre-processing Program -- 3.2 Call Information Analysis of the Source Code -- 3.3 Program Information Analysis -- 3.4 Defect Rules Matching Analysis -- 4 The Results and Analysis of Experiments. , 4.1 Comparing Results of Forward Analysis, Reverse Analysis and Bidirectional Analysis -- 5 Conclusion and Future Work -- References -- A Multilevel Security Model for Search Engine Over Integrated Data -- 1 Introduction -- 2 Related Work -- 2.1 Data Integration and Secure Search -- 2.2 Multi Level Security -- 2.3 Integration of Security Policies -- 3 Scenarios and Systems -- 3.1 Search Systems -- 3.2 The Integration Architecture -- 3.3 Formal Model -- 4 Access Policy Integration -- 4.1 Integration Sequence -- 4.2 Lattice Integration -- 4.3 Mapping Function Translation -- 4.4 Matrix Integration -- 5 Security Analysis and Proof -- 6 Conclusions -- 6.1 Work Summary -- 6.2 Contributions -- 6.3 Future Work -- References -- Security Analysis of Two Identity Based Proxy Re-encryption Schemes in Multi-user Networks -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Organization -- 2 Review of a Multi-use CCA-secure IBPRE Scheme -- 2.1 Definition and Security Model -- 2.2 The Wang et al.'s IBPRE Scheme -- 3 Our Attack -- 3.1 Attack I -- 3.2 Attack II -- 3.3 On Collusion Resistance -- 4 Review of Another IBPRE Scheme -- 4.1 Definition of Single-Hop Unidirectional IBPRE -- 4.2 Security Model for Single-Hop Unidirectional IBPRE -- 4.3 Luo et al.'s IBPRE Scheme -- 5 Security Analysis -- 5.1 Attack by Using the Insecure ReKeyGen Algorithm -- 5.2 On the Transitivity Property -- 6 Conclusion -- References -- Enabling Vehicular Data with Distributed Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Application of ML Algorithms on Traffic Data -- 4 Distributing k-Nearest Neighbors -- 5 Discussion -- 6 Conclusion -- References -- Adapting Distributed Evolutionary Algorithms to Heterogeneous Hardware -- 1 Introduction -- 2 Background -- 3 The HAPA Methodology -- 4 Experimental Setup -- 4.1 The Knapsack Problem -- 4.2 Parameters. , 5 HAPA Phase 1: Know Your Platform -- 5.1 Hardware Description -- 5.2 Ranking Using Standard Benchmark Software -- 5.3 Ranking Using Traditional dGAs -- 5.4 Mathematical Approximation of Running Times -- 6 HAPA Phase 2: Design Your Algorithm -- 6.1 DGA_HAPA: A First Algorithm Derived from HAPA -- 6.2 DGA_HAPA-FM: A Second dGA Derived from HAPA -- 7 HAPA Phase 3: Obtaining the Results -- 7.1 Hit Rate Analysis -- 7.2 Numerical Effort Analysis -- 7.3 Runtime Analysis -- 7.4 Search Diversity Analysis -- 8 Conclusions and Future Research -- References -- Eroca: A Framework for Efficiently Recovering Outsourced Ciphertexts for Autonomous Vehicles -- 1 Introduction -- 1.1 5G Telecommunication Network and Autonomous Vehicle System -- 1.2 Attribute Based Encryption for Sharing Real-Time Traffic Information -- 1.3 Motivation and Contribution -- 1.4 Organization -- 2 Definition and Security Model for KP-ABE-SR -- 3 A Concrete KP-ABE-RS Scheme and Its Security Analysis -- 3.1 Access Tree -- 3.2 The Concrete KP-ABE-RS Scheme -- 3.3 Security Proof -- 4 The Eroca System -- 5 Performance Evaluation -- 6 Conclusion -- References -- Coarser-Grained Multi-user Searchable Encryption in Hybrid Cloud -- 1 Introduction -- 1.1 Related Works -- 1.2 Key Problems -- 1.3 Contributions -- 2 Preliminaries -- 2.1 Broadcast Encryption -- 2.2 Single-User Searchable Encryption -- 2.3 Multi-user Searchable Encryption -- 3 System Model -- 3.1 Basic Model -- 3.2 Data Flows -- 3.3 Coarse-Grained Access Control -- 4 Multi-user Searchable Encryption for Data Sharing -- 4.1 Our Construction -- 4.2 Security Analysis -- 4.3 Comparison -- 5 Implementation -- 5.1 Access Control Implementation -- 5.2 SUSE Scheme Supporting Two-Phase Operation -- 6 Conclusion -- References -- Quantum Information Splitting Based on Entangled States -- 1 Introduction -- 2 Preliminary. , 2.1 For the First MQIS Protocol -- 2.2 For the Second QIS Protocol -- 3 MQIS Protocol Based on ES of Bell States -- 3.1 (2,2) Protocol -- 3.2 (3,3) Protocol -- 3.3 (n,n) Protocol -- 4 QIS Protocol Based on Four-Particle Cluster States -- 5 Protocol Analysis -- 5.1 Security Analysis -- 5.2 Efficiency Analysis -- 6 Conclusion -- References -- Zero-Tree Wavelet Algorithm Joint with Huffman Encoding for Image Compression -- 1 Introduction -- 2 Description of EZW Algorithm -- 3 The Analysis of EZW Performance -- 4 EZW Joint with Huffman Coding Scheme -- 4.1 The Thought of Joint Coding -- 4.2 Joint Coding Simulation Results and Performance Analysis -- 5 Conclusions -- References -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (475 pages)
    Edition: 1st ed.
    ISBN: 9783319495682
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.541
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Acknowledgments -- Contents -- Autonomous Systems -- Testing Paper Optimization Based on Improved Particle Swarm Optimization -- Abstract -- 1 Introduction -- 2 Background and Relative Researches -- 3 Testing Paper Optimization -- 3.1 Particle Swarm Optimization (PSO) -- 3.2 Parameter Initialization -- 3.3 Evaluation Function of the TPOPSO -- 3.4 The Global and Local Optimum -- 4 Experiment and Discussion -- 4.1 Examination Question Database -- 4.2 The Performance of the TPOPSO -- 5 Conclusion -- References -- The Null Space Pursuit Algorithm Based on an Arbitrary Order Differential Operator -- Abstract -- 1 Introduction -- 2 The Null Space Pursuit Algorithm Based on an Arbitrary Order Differential Operator -- 3 Experiment Result and Analysis -- 4 Summary -- Acknowledgement -- References -- Parameters Estimation of Regression Model Based on the Improved AFSA -- Abstract -- 1 Introduction -- 2 Multiple Linear Regression Model -- 3 AFSA -- 4 The Improved AFSA -- 4.1 The Improvement of Algorithm Parameters -- 4.2 The Improved Swarming Behavior -- 4.3 The Definition of Artificial Fish Individuals and Fitness Function -- 4.4 The Process of the Improved AFSA -- 5 Results and Conclusion -- Acknowledgment -- References -- Research on Hysteresis Modeling for Piezoelectric Displacement Actuators -- Abstract -- 1 Introduction -- 2 The Symmetry and Features of Hysteretic Loop Curves for a PZT Patch -- 2.1 Hysteretic Loop and Central Symmetry -- 2.2 Foldback Point and Centrosymmetric Center -- 2.3 The Variation of Loops, Their Upgrading/Degrading and Emerging/Vanishing -- 3 Mathematic Model -- 4 Experimental Results -- 5 Conclusions -- Acknowledgements -- References -- An Iterative Method for the Least Squares Anti-bisymmetric Solution of the Matrix Equation -- Abstract -- 1 Introduction -- 2 An Iterative Method for Solving Problem I. , 3 The Solution for Problem II -- References -- Parallelization of the Conical Area Evolutionary Algorithm on Message-Passing Clusters -- Abstract -- 1 Introduction -- 2 Partially Evolved Parallelization of CAEA -- 2.1 Partially Evolved Island Model -- 2.2 Elitist Migration Among Islands -- 2.3 Dynamic Directional Migration Topology -- 2.4 Procedure of PeCAEA -- 3 Experimental Results and Analysis -- 4 Conclusions -- Acknowledgments -- References -- Design of Heat Preservation Bathtub with Water Saving -- Abstract -- 1 Introduction -- 2 Problem Description -- 3 The Model -- 3.1 Analysis of Bath Process -- 3.2 Analysis of Heat Gain and Loss -- 3.3 A Double Multi-objective Optimization Model -- 3.4 Effect of Bubble Bath Agent -- 4 Sensitivity Analysis -- 5 Conclusion -- References -- A Label-Correlated Multi-label Classification Algorithm Based on Spearman Rank Correlation Coefficient -- Abstract -- 1 Introduction -- 2 An Introduction to Related Algorithms -- 2.1 Spearman Rank Correlation Coefficient -- 2.2 Confidence and Confidence Interval -- 2.3 Multi-label Classification Strategy of Adaboost-SVM -- 3 Label-Correlated Multi-label Classification Model Algorithm (LC-ASVM) -- 3.1 General Design -- 3.2 Correlation Analysis of Characteristics -- 3.3 Confidence Form Multi-label SVM -- 3.4 Build LC-ASVM Model -- 4 Experiment and Analysis -- 4.1 Experimental Datasets -- 4.2 Experimental Results and Analysis -- 5 Conclusions -- References -- Effect of Film Thickness on Load-Carrying Property of Seawater Dynamic-Hydrostatic Hybrid Thrust Bearing -- Abstract -- 1 Introduction -- 2 Brief of Seawater-Lubricated Hydrostatic-Dynamic Thrust Bearing -- 2.1 Lubricate Flow Through the Channel in the Sector Opposed Supporting Ladder-Cavity -- 2.2 Supporting Mechanism for Opposed Supporting Ladder-Cavity -- 2.3 Initial Design Parameters of the Thrust Bearing. , 3 Property Index of the Thrust Bearing -- 3.1 Static Property Index -- 3.2 Dynamic Property Index -- 3.3 Vibration Property Index -- 4 Influence of Shallow Cavity Depth on Static Performance -- 5 Influence of Film Thickness on Dynamic Property Index -- 6 Influence of Film Thickness on Vibration Property Index -- 7 Conclusion -- Acknowledgement -- References -- Research on Static Performance of Water-Lubricated Hybrid Bearing with Constant Flow Supply -- Abstract -- 1 Introduction -- 2 Static Performance Analysis -- 2.1 Flow Condition -- 2.2 Bearing Force Calculation -- 2.3 Static Performance Indexes -- 2.4 Influence of Parameter on Static Index -- 3 Conclusion -- Acknowledgement -- References -- A New Method for Desiccant Package Quality Check -- Abstract -- 1 Introduction -- 2 The Proposed Method -- 2.1 Correct the Captured Image -- 2.2 Wipe Out the Contaminated Samples -- 2.3 Detect the Integrity of the Packaging -- 3 Experiment Result -- 4 Conclusion -- Acknowledgments -- References -- A Novel Algorithm for Laser Spot Detection Based on Quaternion Discrete Cosine Transform -- Abstract -- 1 Introduction -- 2 The Quaternion Discrete Cosine Transform Based Laser Spot Detection -- 2.1 Quaternion Discrete Cosine Transform -- 2.2 Image Moment Method (IMM) -- 3 Experiment -- 4 Conclusions -- References -- Natural Frequency Modification Using Frequency-Shift Combined Approximations Algorithm -- Abstract -- 1 Introduction -- 2 Formulation and Solution -- 2.1 Natural Frequency Sensitivity Analysis Using FSCA Method -- 2.2 Natural Frequency Modification Based on Taylor Series Expansion -- 3 Numerical Example -- 4 Conclusion -- Acknowledgements -- References -- Adaptive Stochastic Ranking Schemes for Constrained Evolutionary Optimization -- Abstract -- 1 Introduction -- 2 Theoretical Analysis and Proposed Approach -- 3 Experimental Results -- 4 Conclusion. , Acknowledgments -- References -- A Case-Based Reasoning Method with Relative Entropy and TOPSIS Integration -- Abstract -- 1 Introduction -- 2 Related Work -- 3 CBR Framwork with Relative Entropy and TOPSIS -- 3.1 Similarity Measure -- 3.2 A New Ensemble Measure -- 4 RTCBR Algorithm -- 5 Experiment Study and Analysis -- 5.1 Experiment Design -- 5.2 Result Analysis -- 6 Conclusion -- Acknowledgment -- References -- An Algorithm Design for Electrical Impedance Tomography Based on Levenberg Method -- Abstract -- 1 Introduction -- 2 Levenberg-Marpuardt Algorithm (L-Algorithm) -- 3 Construct Differential Matrix in L-Algorithm -- 4 Construction of Improved Algorithm for Electrical Impedance Tomography -- 5 Proposed Algorithm and Further Considerations -- 6 Conclusion -- References -- A Return-Value-Unchecked Vulnerability Detection Method Based on Property Graph -- Abstract -- 1 Introduction -- 2 System Design -- 3 Property Graph Representation for Binary Software -- 3.1 Intermediate Representation -- 3.2 Static Analysis Based on Intermediate Representation -- 3.3 Property Graph Generation -- 4 Vulnerability Model and Detect Based on Property Graph -- 4.1 Vulnerability Model -- 4.2 Vulnerability Detection -- 5 Implementation and Evaluation -- 5.1 Implementation -- 5.2 Evaluation -- 6 Summary -- References -- GA Based Optimization of Sign Regressor FLANN Model for Channel Equalization -- Abstract -- 1 Introduction -- 2 Channel Equalization Model -- 2.1 FLANN Model -- 2.2 Optimization Using GA -- 3 Result and Discussion -- 4 Conclusion -- References -- Research of Chemical Fabric Style Prediction System Based on Integrated Neural Network -- Abstract -- 1 Introduction -- 2 Processing of the Samples Data -- 2.1 Preprocessing of Fabric Structure Parameters -- 2.2 Introduction of Fabric Structure Complexity Factor -- 2.3 Method for Dividing Fabric Subset. , 3 Comparison of Two Predictive Methods -- 3.1 Single BP Neural Network Prediction -- 3.2 Integrated Neural Network Prediction -- 4 Conclusion -- Acknowledgements -- References -- Internet and Cloud Computing -- The Influencing Factor Analysis of Micro-blog User Adding Attend Object -- Abstract -- 1 Introduction -- 2 Relationship Between User Intimacy and Attended Objects -- 2.1 Influence Factors of Intimacy and the Representation -- 2.1.1 Basic Factors -- 2.1.2 Considering Factors -- 2.1.3 Influent Factors -- 2.2 The Definition and Computation of Intimation -- 2.3 The Relationship Between User Intimacy and the Attended Object -- 3 The Relationship Between User's Interest Degree and Attended Object -- 3.1 Interest Similarity Calculation -- 3.2 Recommendation Based on Interest Similarity Relationship -- 4 Experiment and Analyzing -- 4.1 Experimental Environment -- 4.2 Evalution Index of Result -- 4.3 Experimental Results -- 5 Conclusion -- Acknowledgement -- References -- History Path Reconstruction Analysis of Topic Diffusion on Microblog -- Abstract -- 1 Introduction -- 2 Problem Formulation -- 2.1 Basic Definition -- 2.2 Topic Detection -- 2.3 Probabilistic Score Based Diffusion Model -- 3 Experiment Results and Discussion -- 3.1 Experiment Realization -- 3.2 Experimental Results and Analysis -- 4 Conclusion -- Acknowledgements -- References -- A Novel Session Identification Scheme with Tabbed Browsing -- Abstract -- 1 Introduction -- 2 Related Works -- 2.1 Traditional Browsing and Tabbed Browsing -- 2.2 Survey of Users' Browsing Modes -- 2.3 Tabbed Browsing and Session Identification -- 3 Fixed Threshold Session Identification Scheme -- 4 Novel Session Identification Scheme -- 5 Experiment and Evaluation -- 5.1 Date Preprocessing -- 5.2 Metrics -- 5.3 Performance Evaluation -- 6 Conclusion -- Acknowledgement -- References. , Research of Optimizing the System Partition in Android System.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Adaptive computing systems. ; Computer-assisted instruction. ; Artificial intelligence. ; Electronic books.
    Description / Table of Contents: This book reviews and analyzes new implementation perspectives for intelligent adaptive learning and collaborative systems, enabled by advances in scripting languages, IMS LD, educational modeling languages and learning activity management systems.
    Type of Medium: Online Resource
    Pages: 1 online resource (343 pages)
    Edition: 1st ed.
    ISBN: 9783642285868
    Series Statement: Studies in Computational Intelligence Series ; v.408
    DDC: 371.360285
    Language: English
    Note: Title Page -- Preface -- Introduction -- Contents -- Part I: Design of Adaptive Learning Systems -- Reuse of Data Flow Designs in Complex and Adaptive CSCL Scripts: A Case Study -- Introduction -- Background -- The Data Flow Problem in Learning Design and the Composition-Based Approach -- Data Flow Approaches and the Reuse Dimension -- The LeadFlow4LD Design Methodology -- MOSAIC Case Study -- A LeadFlow4LD Implementation of MOSAIC Scenario -- Discussion -- An Abstract Workflow Template-Based Approach -- Conclusions and Future Work -- References -- System Orchestration Support for a Collaborative Blended Learning Flow -- Introduction -- Description of a Previous Experimental Study -- Description of the Experiment: Meeting the Campus Together -- Overview of the Results of the Experiment -- Limitations on the Orchestration Tasks -- System for the Scripted Orchestration -- Course Flow Management Technologies -- The Scripted Course Flow -- Technical Details of the Scripted Flow -- Results Analysis of the Solution: A Simulation -- Conclusions -- References -- Adaptive Collaboration Scripting with IMS LD -- Introduction -- CSCL Scripts - Theory and Adaptation -- Related Work -- Proposed Extensions to IMS LD -- Examples -- Modelling Group Work -- Groups -- Artefacts -- Sequencing- and Execution Flow- Specification -- Environments and Collaboration Contexts -- Services -- Service Selection -- Functions -- Permissions -- Monitoring Execution and Reacting to State Changes -- Run-Time Model -- Event Handling -- Exception Handling -- Adaptive Interventions -- Basic Adaptation Actions -- Advanced Adaptation Mechanisms -- Summary and Outlook -- References -- Extending IMS-LD Capabilities: A Review, a Proposed Framework and Implementation Cases -- Introduction -- Background -- AICLS Systems and Adaptation Patterns. , A Review of IMS-LD Based Adaptation Attempts -- AICLS Reference Framework: IRMO and MAPIS -- Requirements from an AICLS Framework -- MAPIS: Architecture for Implementing Adaptations with IMS-LD -- MAPIS Case Studies: Adaptations Expressed in IMS-LD -- Trigger Peer Interactions -- Discussion and Future Work -- References -- Prototype Tools for the Flexible Design of CSCL Activities Based on the Adaptation Pattern Perspective -- Introduction -- Supporting Collaboration -- Collaboration Scripts and the Need for Flexibility -- Adaptive Collaboration Support -- Research Motivation -- Adaptation Patterns -- The Nature of Adaptation Patterns -- The DeACS Methodology -- Adaptation Pattern Analysis -- The FlexCoLAB System -- Authoring Environment -- Student Environment -- PPR (Pyramid Peer Review) -- The Core Idea -- Design Analysis- The Design Axes -- System Architecture -- The Case Study -- Conclusions and Future Work -- References -- Adapting the Collaborative Strategy 'Students Team Achievement Divisions' in an Information Technology Work Place -- Introduction -- Background -- LAMS -- Student - Teams - Achievement - Divisions (STAD) -- Adaptation -- Design of an Adaptive STAD Online Learning Activity in LAMS -- Phase 1: Introduction to the Learning Activity -- Phase 2: Personal Assessment -- Phase 3: Adaptive Group Formation -- Phase 4: Adaptive Individual Learning and Group Collaboration -- Phase 5: Adaptive Collaborative Group Report Preparation -- Phase 6: Group Report Presentation -- Phase 7: Team Assessment -- Phase 8: Adaptive Individual Assessment -- Phase 9: Praise for Best Group Reports -- Implementing the 2nd Phase of the Adaptive Collaborative Method STAD: Determining Learners-Employees' Learning Styles within the Context of an IT Work Place -- Aims of the Approach -- The Framework of the Legal Council of the Hellenic State. , Research Tools and Methodology -- Presentation-Annotation of the Aggregate Results of the Survey -- Summary and Future Work -- References -- Part II: Interactive and IntelligentLearning Systems -- Examining the Interrelation between the Interaction Analysis and Adaptation Research Fields within Communication-Based Collaborative Learning Activities: Convergence, Divergence or Complementarity? -- Introduction -- Computer-Based Interaction Analysis (IA) -- State of the Art -- Adaptation in CSCL -- Flexibility and Interoperability of IA Tools -- Discussion -- References -- Making Adaptations of CSCL Scripts by Analyzing Learners' Online Behavior -- Introduction -- Interaction Analysis -- Interaction Analysis Indicators -- Interaction Analysis Tools -- An Example: Adapting a Learning Script Based on a TPS Strategy Using IA Techniques -- Concluding Remarks -- References -- Behavioural Prototyping©: Making Interactive and Intelligent Systems Meaningful for the User -- Background -- Psychological Perspectives -- Interactivity and Intelligence -- Problem Solving and Learning -- Affordances and the Nature of Perceived Use -- Shortcomings of Designs: The Importance of Behavioural Profiles -- Prototypes and Archetypes -- Inclusive Design -- Formalized Behavioural Prototyping© -- Conclusion: Strengths of the Framework -- References -- The Design of a Teacher-Driven Intelligent Agent System for Supervising Lessons in LAMS -- Introduction -- Monitoring and Supervising the Learning Process and the Collaboration in LMSs -- Related Work -- Supporting the Supervisor of a Lesson in LAMS -- An Agent-Based Architecture for Intelligent Monitoring and Supervising of Lessons in LAMS -- The Scheduler Agent -- The Monitoring Agent -- The User Notification Agent -- Examples of Rules Producing Feedback Messages -- Feedback Messages Taxonomy -- Alert Messages. , Awareness Messages -- Evaluation Reports and Messages for Learners and Activities -- Response of the Messaging System to a Learning Scenario -- An Evaluation Scenario -- Conclusions and Future Work -- References -- The Text-Based Computer-Mediated Communication in Distance Education Fora: A Modelling Approach Based on Formal Languages -- Introduction -- Theoretical Framework -- Generally -- The Complexity of Text Based Computer-Mediated Communication (CMC) -- Theoretical Approaches -- Methodological Framework -- HOU Fora and Choices Justification -- Modelling of HOU Distance Education Forum -- System Development -- Data Filtering -- Roots Files Storage -- String Output -- System Integration -- Exemplary Operation -- Input -- Output -- Experiments -- Phase A -- Phase B -- Discussion -- References -- Part III: Collaborative Learning Systems -- Antecedents of Collaborative Learning in Massively Multiplayer Online Games -- Introduction -- Theoretical Background: MMOGs and Collaborative Learning -- Research Methodology -- Data Collection -- Data Analysis -- Tasks, Groups and the Player Community -- Tasks and Activities -- Team Practices -- Community Practices and the Social Environment -- Discussion and Conclusions -- References -- Validating Empirically a Rating Approach for Quantifying the Quality of Collaboration -- Introduction -- Collaborative Setting -- Determining Relations between Dimensions of Collaboration Quality -- The Rating Approach -- Rating Scheme -- Rating Process -- Reliability of Ratings -- Relations between Dimensions of Collaboration Quality -- Multidimensional Scaling of Dimensions of Collaboration Quality -- Results and Internal Validation of the MDS Algorithm -- Interpretation of the MDS Results -- Conclusions and Further Research -- References. , Internet-Mediated Communities of Practice: Identifying a Typology of Critical Elements -- Introduction -- Conceptual Foundations -- Historical Overview and Theory of Communities of Practice -- Internet-Mediated Communities of Practice -- Research Framework -- Methodology -- Results -- Discussion -- References -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...