Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Book
    Book
    Berlin [u.a.] : Mouton de Gruyter
    UID:
    b3kat_BV035026392
    Format: S. 349 - 531 , graph. Darst.
    Series Statement: Cognitive linguistics 19,3 : Special issue
    Language: English
    Subjects: Comparative Studies. Non-European Languages/Literatures
    RVK:
    Keywords: Sprachgebrauch ; Sprachverarbeitung ; Aufsatzsammlung
    Author information: Zeschel, Arne 1973-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    kobvindex_INTEBC5802488
    Format: 1 online resource (439 pages)
    Edition: 1st ed.
    ISBN: 9783030134990
    Note: Intro -- Foreword -- Contents -- Contributors -- International Board of Reviewers -- Acronyms -- Part I Introduction -- 1 Introducing Managed Software Evolution -- 2 The Nature of Software Evolution -- 2.1 Introduction -- 2.2 Software Systems -- 2.2.1 Application Domains -- 2.2.2 Scopes and Environments of Software Systems -- 2.2.3 Software Artefacts -- 2.2.4 Software Variants -- 2.3 Software Quality -- 2.3.1 Consistency -- 2.3.2 Correctness -- 2.3.3 Dependability -- 2.3.4 Performance -- 2.3.5 Usability -- 2.3.6 Maintainability -- 2.4 Software Evolution -- 2.4.1 Kinds of Software Change -- 2.4.2 Evolution Processes -- 2.4.3 Configuration Management -- 3 Addressed Challenges -- 3.1 Tacit Knowledge -- 3.2 Design Decisions -- 3.3 Software Product Line Round-Trip Engineering -- 3.4 Maintaining Performance -- 3.5 Maintaining Security -- 3.6 Learning from Evolution for Evolution -- 3.7 Maintaining Correctness -- 4 Introduction to Case Studies -- 4.1 Evolution of Long-Living Systems to an Industry 4.0 Case Study -- 4.2 Introduction of the CoCoME Case Study -- 4.2.1 Platform Migration -- 4.2.2 Adding a Pick-Up Shop -- 4.2.3 Database Migration -- 4.2.4 Adding a Mobile App Client -- 4.2.5 Microservice Architecture -- 4.2.6 Container Virtualization -- 4.2.7 Adding Payment Methods -- 4.3 Introduction of the PPU and xPPU Case Studies -- 4.3.1 Evolution Scenarios of the PPU -- 4.3.2 Incremental Evolution Scenarios -- 4.3.3 Evolution Scenarios of the xPPU -- 4.4 Industry 4.0 Case Study -- 4.4.1 Industry 4.0 Interface of the xPPU -- 4.4.2 Integration of CoCoME and xPPUto Form an Industry 4.0 Case Study -- Part II Knowledge Carrying Software -- 5 Tacit Knowledge in Software Evolution -- 5.1 Toward Identification and Extraction of Tacit Knowledge -- 5.2 Foundations -- 5.3 Tacit Knowledge During Design Time -- 5.3.1 Security in Requirement Documents , 5.3.2 Modelling of Security Knowledge -- Security Ontology -- Representation of Knowledge -- 5.3.3 Identification and Extraction of Tacit Security Knowledge -- Classification of Words -- Measurement of Similarity Between Security Abstraction Models -- (Semi)-Automatic Acquisition of Tacit Knowledge -- 5.3.4 Tacit Security Knowledge Examples -- 5.4 Tacit Knowledge During Run Time -- 5.4.1 Usage Knowledge in Software Evolution -- 5.4.2 Modelling of Knowledge -- 5.4.3 Identification and Extraction of Tacit Usage Knowledge -- Runtime Personas -- Extraction of Tacit Usage Knowledge -- 5.4.4 Tacit Usage Knowledge Examples -- 5.5 Related Work -- 5.6 Conclusion -- 5.6.1 Summary -- 5.6.2 Outlook -- 5.6.3 Further Reading -- 6 Continuous Design Decision Support -- 6.1 Introduction -- 6.1.1 Challenges for a Continuous Design Decision Support -- 6.1.2 Solution Approaches for Design Decision Challenges -- 6.1.3 Structure of This Chapter -- 6.2 Foundations -- 6.3 Using a Design Pattern Catalogue to Make Design Decisions -- 6.3.1 Motivation for Using a Pattern Catalogue -- 6.3.2 Decision-Making Process Using a Pattern Catalogue -- 6.3.3 Application to the Case Study -- 6.4 Integrating Design Decision Models with Program Code -- 6.4.1 Integrating Architecture Models with Code -- 6.4.2 Design Decisions, Rationale, and Patterns in the IAL -- 6.4.3 Application to the Case Study -- 6.5 Continuous Management of Decision Knowledge -- 6.5.1 Integrating Design Decisions into CSE -- 6.5.2 Decision Knowledge Triggers -- Making Tacit Decisions Explicit -- Packaging Distributed Decision Knowledge -- Considering Consistency Between Decisions -- 6.5.3 Application to the Case Study -- Scenario for the Explicit Documentation of Decision Knowledge -- Scenario for Making Tacit Decisions Explicit -- Scenario for Packaging Distributed Decision Knowledge , Scenario for Considering Consistency Between Decisions -- 6.6 Related Work -- 6.6.1 Documentation Consistent with External Decision Knowledge -- 6.6.2 Documentation of Decision Knowledge Consistent with Architecture and Code -- 6.6.3 Non-intrusive Documentation of Decision Knowledge -- 6.7 Conclusion -- 6.8 Further Reading -- 7 Model-Based Round-Trip Engineering and Testing of Evolving Software Product Lines -- 7.1 Foundations -- 7.1.1 Model-Based Software Development and Testing -- 7.1.2 Model-Based Product-Line Engineering and Testing -- 7.1.3 Product-Line Round-Trip Engineering and Artefact Co-evolution -- 7.2 Evolution -- 7.2.1 Evolution of Software Variants -- 7.2.2 Evolution of Software Product Lines -- 7.2.3 Evolution of Model-Based Testing Artefacts -- 7.3 Co-evolution -- 7.3.1 Co-evolution of Software Product Lines and Product Variants -- 7.3.2 Co-evolution of Software Product Lines and Model-Based Testing Artefacts -- 7.3.3 Co-evolution of Product Variants and Test Artefacts -- 7.4 Conclusion -- 7.5 Further Reading -- 8 Performance Analysis Strategies for Software Variants and Versions -- 8.1 Analysis Strategies for Software Variants -- 8.1.1 Sample-Based Analysis of Software Variants -- 8.1.2 Family-Based Test-Suite Generation for Software Variants -- 8.1.3 Family-Based Analysis of Software Variants -- 8.2 Analysis Strategies for Software Versions -- 8.2.1 Declarative Analysis Strategies for Evolving Software -- 8.2.2 Align Development-Level Evolution and Operation-Level Adaptation -- 8.2.3 Co-evolution of Architecture and Analysis Models -- Sequence Diagram to Layered Queueing Network -- State Charts to Continuous Time Markov Chains -- Analysis of LQN and CTMC Models with Model Solvers -- 8.3 Conclusion and Road Map -- 9 Maintaining Security in Software Evolution -- 9.1 Foundations , 9.2 Design Time: Leveraging Knowledge from Natural Language for Design-Time System Adaptation -- 9.2.1 Overview -- 9.2.2 Capturing Security Requirements Using Natural-Language Processing -- 9.2.3 Representing Security Knowledge Using Ontologies -- 9.2.4 Rule-Based Model Co-evolution -- 9.2.5 Related Work -- 9.2.6 Leveraging Security Knowledge to Infer Adequate Reaction to Context Changes -- 9.2.7 Summary -- 9.3 Integrating Model-Based Security Constraints with Program Code -- 9.3.1 Codeling: Integrating Architecture Model Information with Program Code -- 9.3.2 Application: Security Evolution Scenario -- 9.3.3 Security Aspects in the Intermediate Architecture Language -- 9.3.4 Integrating Security-Architectures with Code Using the Model Integration Concept -- 9.3.5 Related Work -- 9.3.6 Summary -- 9.4 Contextual Security Patterns -- 9.4.1 Security Challenges in Software Evolution -- 9.4.2 Contextual Security -- 9.4.3 From Design Patterns to Security Patterns -- 9.4.4 Security Patterns as a Means for Contextual Software Security -- 9.4.5 Related Work -- 9.4.6 Summary -- 9.5 Self-adaptive Security Maintenance at Run Time by Identifying Suspicious Behaviour -- 9.5.1 Overview -- Application: Running Example -- 9.5.2 Capturing Context for Security Adaption -- 9.5.3 Leveraging Run-Time Information to Support Design-Time Security Adaption -- 9.5.4 Heuristics-Based Run-Time Assessment to Detect Security Requirement Violations -- 9.5.5 Adaption During Run Time -- 9.5.6 Related Work -- 9.5.7 Summary -- 9.6 Anomaly Detection for Evolving Software Controlled Production Systems at Run Time -- 9.6.1 Overview -- 9.6.2 Detection Model: Machine State Petri Net -- 9.6.3 Anomaly Detection Mechanism -- 9.6.4 Example: Using the PPU Case Study -- 9.6.5 Related Work: Finding Behaviour Anomalies -- 9.6.6 Summary -- 9.7 Conclusion -- 9.8 Further Reading , 10 Learning from Evolution for Evolution -- 10.1 Detailed Analysis of Past Evolutions of Models -- 10.1.1 Analysing Linear Evolution of Monolithic Models -- Motivation and Goals -- Overview of the Approach -- Example Applications -- 10.1.2 Analysing Co-evolution of Coupled Models -- A Generic Framework for Analysing Model Co-evolution -- Case Study on Architecture and Fault Tree Co-evolution -- 10.1.3 Related Work -- 10.1.4 Conclusion -- 10.1.5 Further Reading -- 10.2 Formal Analysis of Planned Changes -- 10.2.1 Using Model-Based Verification of Interdisciplinary Models -- 10.2.2 Using Regression Verification for Small Evolution Steps in PLC-Code -- 10.2.3 Conclusion and Outlook -- 10.3 Analyse Non-functional Aspects of the System -- 10.3.1 Learning and Analysing the Machine States and Material Flow of Evolving ManufacturingSystems -- Three-Phase Evolution Support Process -- Application on xPPU Case Study -- 10.3.2 Learning and Analysing DTMCs for Reliability Evaluation -- Related Work -- Further Reading -- 10.3.3 Conclusion and Outlook -- 10.4 Recommend and Assess Future Changes Basedon Past Changes -- 10.4.1 Supporting Model Editing with Automatic Recommendations -- Foundation -- Analysis of Change Histories -- Inferring Blueprints -- Evaluation -- Related Work -- Conclusion -- 10.4.2 Recommending Evolution Steps Within a Knowledge Carrying Network -- Express Evolution Steps of a System -- Application on xPPU Case Study -- Related Work -- Further Reading -- 10.4.3 Learning Maintainability Estimation for Enabling an ``Economical Effort Recommender'' -- Challenges for Maintainability Estimation: Information Systems vs. Automated Production Systems -- Karlsruhe Architectural Maintainability Prediction for Automated Production Systems: An Architecture-Based Change Impact Analysis Method for aPS -- 10.4.4 Conclusion and Outlook -- 10.5 Conclusion , 11 Formal Verification of Evolutionary Changes
    Additional Edition: Print version Reussner, Ralf Managed Software Evolution Cham : Springer International Publishing AG,c2019 ISBN 9783030134983
    Language: English
    Keywords: Electronic books
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    kobvindex_INTEBC1787209
    Format: 1 online resource (382 pages)
    ISBN: 9783110410167
    Content: This handbook introduces key elements of the philological research area called paremiology. It presents the main subject area as well as the current status of paremiological research. Each chapter is written by a leading scholar-specialist in their area of proverbial research. The book successfully represents a measured balance between the popular and scientific approach.
    Note: Intro -- OLE_LINK2 -- OLE_LINK3 -- OLE_LINK9 -- OLE_LINK12 -- OLE_LINK13 -- OLE_LINK10 -- OLE_LINK11 -- OLE_LINK1 -- OLE_LINK7 -- OLE_LINK8 -- OLE_LINK6 -- List of contributing authors -- Hrisztalina Hrisztova-Gotthardt, Melita Aleksa Varga -- Introduction -- References -- Neal R. Norrick -- 1 Subject Area, Terminology, Proverb Definitions, Proverb Features -- 1.1 The Subject Area of Paremiology -- 1.2 Terminology -- 1.2.1 The Proverb and Its Kin -- 1.2.2 Self-containedness -- 1.2.3 Traditionality -- 1.2.4 Didactic Content -- 1.2.5 Fixed Form -- 1.2.6 Poetic Features -- 1.3 Proverb Definitions -- 1.4 Proverb Features -- 1.4.1 Polysemy -- 1.4.2 Pun -- 1.4.3 Hyperbole -- 1.4.4 Irony -- 1.4.5 Tautology -- 1.4.6 Paradox -- 1.4.7 Connotation -- 1.4.8 Imagery -- 1.4.9 Syntactic Features -- 1.4.10 Discourse Features -- 1.5 Conclusion -- References -- Wolfgang Mieder -- 2 Origin of Proverbs -- 2.1 Introduction -- 2.2 The Creation of Proverbs -- 2.3 Four Major Sources for Common European Proverbs -- 2.4 Origin of Some Modern Proverbs -- 2.5 New Theories on the Creation of Proverbs -- 2.6 Conclusion -- References -- Outi Lauhakangas -- 3 Categorization of Proverbs -- 3.1 Introduction -- 3.2 The Specificity of Proverbs -- 3.3 Whose Tradition Are Proverbs? -- 3.4 Practical and Ideological Needs to Categorize Proverb Material -- 3.5 Differences in the Accuracy of Proverb Material -- 3.6 From Intuitive Orderliness to Systematic Categorization -- 3.7 G. L. Permyakov's Logico-semiotic Classification of Proverbs and Proverbial Phrases -- 3.8 The Matti Kuusi International Type System of Proverbs -- 3.9 Comparison Between Permyakov's Logico-semiotic Categorization and Kuusi's Type System -- 3.9.1 Permyakov's is not worth in Kuusi's System -- 3.9.2 Permyakov's absence of in Kuusi's System. , 3.10 Automatic Data Processing and New Possibilities to Construct Proverb Databases -- 3.11 Summary -- References -- Peter Grzybek -- 4 Semiotic and Semantic Aspects of the Proverb -- 4.1 Semiotics and the Proverb -- 4.2 Semiotics and Its Dimensions -- 4.2.1 Pragmatics -- 4.2.2 Syntactics -- 4.2.3 Semantics -- 4.3 Metalanguage -- 4.4 "Indirectness" and "Non-literalness" -- 4.5 Holistic vs. Componential Analysis, Analytical vs. Synthetic Clichés -- 4.6 Sign Concepts: System-based vs. Process-oriented Semiotics -- 4.7 Logics and Analogics -- 4.8 Analogy, Double Analogy, and the Concept of Situativity -- 4.9 From Proverb Semantics to Semantic Proverb Classification -- 4.10 Theoretical and Empirical Paremiology and the Semiotics of Culture -- References -- Marcas Mac Coinnigh -- 5 Structural Aspects of Proverbs -- 5.1 Structure and Style -- 5.2 Sentences and Phrases -- 5.2.1 Sentence Type -- 5.2.2 Sentence Function -- 5.3 Syntax and Structure -- 5.3.1 Proverbial Formulae -- 5.3.2 The Wellerism -- 5.3.3 Anti-proverbs -- 5.4 Structural Markers -- 5.4.1 Syntactic Parallelism -- 5.5 Emphatic Word Order -- 5.5.1 Clefting -- 5.5.2 Left-dislocation -- 5.5.3 Topicalisation -- 5.5.4 Sub-Clausal Fronting -- 5.6 Parataxis -- 5.6.1 Relationship Between Juxtaposed Phrases / Clauses -- 5.7 Concluding Remarks -- References -- Vida Jesenšek -- 6 Pragmatic and Stylistic Aspects of Proverbs -- 6.1 Introduction and Theoretical Framework -- 6.2 Stylistic of Proverbs -- 6.2.1 Proverbs and Rhetorical Devices -- 6.2.2 Proverbs and Stylistic Registers -- 6.2.3 Proverbs and Stylistic Colouring -- 6.2.4 Proverbs and the Feature of Expressivity -- 6.3 Pragmatic Aspects of Proverbs -- 6.3.1 Argumentative Functions of Proverbs -- 6.3.2 Proverbs as Items of Speech Acts in Non-argumentative Contexts. , 6.3.3 Proverbs in Text-constituting and Text-structuring Functions -- 6.4 Conclusion and Outlook -- References -- Anna Lewandowska, Gerd Antos -- 7 Cognitive Apects of Proverbs -- 7.1 Introduction -- 7.2 Lakoff and Johnson's Conceptual Metaphor Theory -- 7.3 Metaphorical Concepts -- 7.4 Epistemological Essentials -- 7.5 Proverb Concepts (PCs) -- 7.6 Structural Elements of Proverb Concepts -- 7.6.1 Linguistically Concise Form -- 7.6.2 Syntactic-semantic Structure -- 7.6.3 Holism -- 7.6.4 Structural Simplicity -- 7.6.5 Cultural Frame -- 7.6.6 Ability to Project -- 7.6.7 Ability to Implicate -- 7.7 The Relation of MCs to PCs -- References -- Peter and#x10E;určo -- 8 Empirical Research and Paremiological Minimum -- 8.1 What a Paremiological Minimum Ought to Be? -- 8.2 Why Do We Need a Paremiological Minimum or Optimum? -- 8.3 How to Get a Paremiological Optimum? An Empirical Approach -- 8.4 The Concept of a Paremiological Optimum. A Complex Approach -- 8.5 An Example: Paremiological Optimum of Slovak Language -- 8.5.1 Method -- 8.5.2 Questionnaire -- 8.5.3 Empirical Survey Findings -- 8.5.4 Corpus Analysis Findings -- 8.6 Paremiological Optimum of Slovak Language - correlation of the knowledge/familiarity and the corpus frequency -- 8.7 Conclusions -- References -- Kathrin Steyer -- 9 Proverbs from a Corpus Linguistic Point of View -- 9.1 Introduction -- 9.2 Why Corpora? -- 9.3 Corpus Linguistic Approaches to Proverb Study -- 9.3.1 Corpus-based Questions About Proverbs -- 9.3.1.1 Proverb - Yes or No? -- 9.3.1.2 Fixedness and Variance -- 9.3.1.3 Proverb Frequency -- 9.3.1.4 Meaning and Usage -- 9.3.2 Proverbs - Corpus Driven -- 9.4 Summary and Outlook -- References -- Appendix 1 -- Tamás Kispál -- 10 Paremiography: Proverb Collections -- 10.1 Definition of Proverbs, Proverb Collections and Proverb Dictionaries. , 10.1.1 Definition of Proverbs -- 10.1.2 Definition of Proverb Collections and Proverb Dictionaries -- 10.2 Usage of Printed Proverb Collections -- 10.2.1 Which One to Use? -- 10.2.2 How to Find a Proverb in a Proverb Collection? -- 10.2.3 What Kind of Information is Contained Under a Proverb Entry? -- 10.2.3.1 Information on Standard Proverb Forms and Variants -- 10.2.3.2 Information on Meaning of Proverbs -- 10.2.3.3 Information on Usage of Proverbs -- 10.2.3.4 Proverb Exercises -- 10.3 Usage of Electronic Proverb Collections -- 10.3.1 How to Find a Proverb in an Electronic Proverb Collection? -- 10.3.2 What Kind of Information Contains a Proverb Entry? -- 10.3.2.1 Information on Standard Proverb Forms and Variants -- 10.3.2.2 Information on the Meaning of Proverbs -- 10.3.2.3 Information on Usage of Proverbs -- 10.3.2.4 Exercises on Proverbs -- 10.4 Conclusion -- References -- Roumyana Petrova -- 11 Contrastive Study of Proverbs -- 11.1 Introduction -- 11.2 Comparative and Contrastive Approach -- 11.3 The Beginnings: Contrastive Paremiography -- 11.4 Contrastive Paremiology: What Is It All About? -- 11.5 New Approaches to Contrastive Paremiology: Tertium Comparationis -- 11.6 Contrastive Paremiology and the Ethnic Aspect of Proverbs -- 11.7 Modern Contrastive Paremiology: A Short Overview -- 11.8 New Approaches to Contrastive Paremiology -- 11.8.1 The Semantic Approach -- 11.8.2 The Linguocultural Approach -- 11.8.3 The Cognitive Approach -- 11.8.4 The Culturematic Method -- 11.9 Concluding Remarks -- References -- Charles Clay Doyle -- 12 Proverbs in Literature -- 12.1 Introduction -- 12.2 Proverbs in Poetry -- 12.3 Proverbs in Prose Fiction -- 12.4 Proverbs in Plays -- 12.5 Proverbs in Other Kinds of Literature -- 12.6 Conclusion -- References -- Anna Konstantinova -- 13 Proverbs in Mass Media. , 13.1 Introduction -- 13.2 Proverbs in the Media Discourse: General Remarks -- 13.3 Traditional Proverbs in Mass Media -- 13.4 Modification of Proverbs in Mass Media -- 13.5 The Role of Proverbs on the Structural Level of Media Texts -- 13.6 The Role of Proverbs on the Semantic Level of Media Texts -- References -- Sabine Fiedler -- 14 Proverbs and Foreign Language Teaching -- 14.1 Introduction -- 14.2 Proverbs in Foreign Language Learning and Teaching -- 14.2.1 On the Significance of Including Proverbs into Foreign Language Teaching -- 14.2.2 The Motivational Potential of Proverbs -- 14.2.3 Proverbs as a Basis for Language Learning and Teaching -- 14.2.4 Proverbs and Figurative Language -- 14.2.5 Proverbs as a Mirror of Culture -- 14.2.6 Proverbs and Fluency -- 14.3 Towards a Proverb Optimum -- 14.3.1 Selection Criteria -- 14.3.2 A Questionnaire Study -- 14.3.2.1 The Knowledge of Proverbs Among Advanced Learners of English -- 14.3.2.2 Mother Tongue Influences -- 14.3.2.3 The Role of Context -- 14.3.3 Some Implications for the Learning and Teaching of Proverbs -- 14.3.3.1 Teaching Proverbs in an Appropriate Context -- 14.3.3.2 Sources of Reference -- 14.3.3.3 Receptive and Productive Knowledge -- 14.3.3.4 The Contrastive Perspective -- 14.4 Final Remarks -- References -- Appendix 1 -- Appendix 2 -- Anna T. Litovkina -- 15 Anti-proverbs -- 15.1 Introduction -- 15.2 Terminology -- 15.3 Occurrence of Anti-proverbs -- 15.4 Proverbs Most Popular for Variation -- 15.5 Anti-proverbs with International Distribution -- 15.6 Types of Proverb Alterations -- 15.7 Themes Treated in Proverb Transformations -- 15.8 Background of Research -- 15.9 Summary -- 15.10 Implications for Further Research -- References -- Glossary of Key Terms Appearing in the Book -- Index. , Table 3.1: G. L. Permyakov's (1979: 180-195) logico-semiotic arch-invariants represented by logico-thematic groups and subgroups A-C. (The subclasses and oriental proverb variants are not presented in this table.).
    Additional Edition: Print version: Hrisztova-Gotthardt, Hrisztalina Introduction to Paremiology Warschau/Berlin : Walter de Gruyter GmbH,c2015 ISBN 9783110410150
    Language: English
    Keywords: Electronic books.
    URL: FULL  ((Currently Only Available on Campus))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    gbv_1653688556
    Format: Online-Ressource (XXXIV, 618 p. 180 illus, online resource)
    ISBN: 9783319054582
    Series Statement: Lecture Notes in Computer Science 8398
    Content: The two-volume set LNAI 8397 and LNAI 8398 constitutes the refereed proceedings of the 6th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2014, held in Bangkok, Thailand in April 2014. The 125 revised papers presented were carefully reviewed and selected from 300 submissions. Suggestion: The aim of the conference is to provide an internationally respected forum for scientific research in the technologies and applications of intelligent information and database systems. The papers are organized in topical sections on Natural Language and Text Processing, Intelligent Information Retrieval, Semantic Web, Social Networks and Recommendation Systems, Intelligent Database Systems, Decision Support Systems, Computer Vision Techniques, Machine Learning and Data Mining, Multiple Model Approach to Machine Learning, MMAML 2014, Computational Intelligence, CI 2014, Engineering Knowledge and Semantic Systems , IWEKSS 2014, Innovations in Intelligent Computation and Applications, IICA 2014, Modelling and Optimization Techniques in Information Systems, Database Systems and Industrial Systems, MOT 2014, Innovation via Collective Intelligences and Globalization in Business Management, ICIGBM 2014, Intelligent Supply Chains, ISC 2014, and Human Motion: Acquisition, Processing, Analysis, Synthesis and Visualization for Massive Datasets, HMMD 2014
    Note: Literaturangaben , Part INatural Language and Text Processing A Meta-model Guided Expression Engine -- Text Clustering Using Novel Hybrid Algorithm -- Combination of Multi-view Multi-source Language Classifiers for Cross-Lingual Sentiment Classification -- Learning to Simplify Children Stories with Limited Data -- Clustering Based Topic Events Detection on Text Stream -- Nonterminal Complexity of Weakly Conditional Grammars -- Thai Grapheme-Phoneme Alignment: Many-to-Many Alignment with Discontinuous Patterns -- A New Approach for Mining Top-Rank-k Erasable Itemsets -- Intelligent Information Retrieval New Method for Extracting Keyword for the Social Actor -- Query Expansion Using Medical Subject Headings Terms in the Biomedical Documents -- Improving Health Question Classification by Word Location Weights -- Entity Recognition in Information Extraction -- Author Name Disambiguation by Using Deep Neural Network -- Incremental Refinement of Linked Data: Ontology-Based Approach -- Using Lexical Semantic Relation and Multi-attribute Structures for User Profile Adaptation -- Auto-Tagging Articles Using Latent Semantic Indexing and Ontology -- Evaluating Profile Convergence in Document Retrieval Systems -- Similarity Search among Real Valued Vectors -- Semantic Web, Social Networks and Recommendation Systems -- Finding the Cluster of Actors in Social Network Based on the Topic of Messages -- Geodint: Towards Semantic Web-Based Geographic Data Integration -- SPARQL - Compliant Semantic Search Engine with an Intuitive User Interface -- A General Model for Mutual Ranking Systems -- Automated Interestingness Measure Selection for Exhibition Recommender Systems -- Equivalent Transformation in an Extended Space for Solving Query-Answering Problems -- Knowledge Generalization during Hierarchical Structures Integration -- Design and Implementation of an Adaptive Tourist Recommendation System -- Improving Efficiency of PromoRank Algorithm Using Dimensionality Reduction -- A Framework to Provide Personalization in Learning Management Systems through a Recommender System Approach -- Intelligent Database Systems -- Agent-Based Modelling the Evacuation of Endangered Areas -- DPI: Dual Private Indexes for Outsourced Databases -- Anomaly SQL SELECT-Statement Detection Using Entropy Analysis -- Deriving Composite Periodic Patterns from Database Audit Trails -- Comparison of Stability Models in Incremental Development -- An Approach of Finding Maximal Submeshes for Task Allocation Algorithms in Mesh Structures -- A GA-Based Approach for Resource Consolidation of Virtual Machines in Clouds -- Problems of SUMO-Like Ontology Usage in Domain Modelling -- Intelligent Information Systems -- Implementation of Emotional-Aware Computer Systems Using Typical Input Devices -- An Item Bank Calibration Method for a Computer Adaptive Test -- Hybrid Approach to Web Based Systems Usability Evaluation -- Application of Network Analysis in Website Usability Verification -- Travel Password: A Secure and Memorable Password Scheme -- Performance Measurement of Higher Education Information System Using IT Balanced Scorecard -- Decision Support Systems -- Decisional DNA Based Framework for Representing Virtual Engineering Objects -- A Data Quality Index with Respect to Case Bases within Case-Based Reasoning -- Agent’s Autonomy Adjustment via Situation Awareness -- The Development of a Decision Support Model for the Problem of Berths Allocation in Containers Terminal Using a Hybrid of Genetic Algorithm and Simulated Annealing -- Sensitivity Analysis of a Priori Power Indices.-Artificial Neural Network Based Prediction Model of the Sliding Mode Control in Coordinating Two Robot Manipulators -- Comparison of Reproduction Schemes in Spatial Evolutionary Game Theoretic Model of Bystander Effect -- Ant Colony Optimization Algorithm for Solving the Provider - Modified Traveling Salesman Problem -- Controlling Quality of Water-Level Data in Thailand -- Application of Nonlinear State Estimation Methods for Sport Training Support -- Computer Vision Techniques -- Multiple Object Tracking Based on a Hierarchical Clustering of Features Approach -- A Copy Move Forgery Detection to Overcome Sustained Attacks Using Dyadic Wavelet Transform and SIFT Methods -- Methods for Vanishing Point Estimation by Intersection of Curves from Omnidirectional Image -- Human Detection from Mobile Omnidirectional Camera Using Ego-Motion Compensated -- Simple and Efficient Method for Calibration of a Camera and 2D Laser Rangefinder -- Iris Image Quality Assessment Based on Quality Parameters -- Contextual Labeling 3D Point Clouds with Conditional Random Fields -- Part I -- Categorization of Sports Video Shots and Scenes in TV Sports News Based on Ball Detection -- A Coral Mapping and Health Assessment System Based on Texture Analysis -- Navigation Management for Non-linear Interactive Video in Collaborative Video Annotation -- Machine Learning and Data Mining -- Intelligent Fuzzy Control with Multiple Constraints for a Model Car System with Multiplicative Disturbance -- The Design of Knowledge-Based Medical Diagnosis System for Recognition and Classification of Dermatoglyphic Features -- Exact Discovery of Length-Range Motifs -- Feature Reduction Using Standard Deviation with Different Subsets Selection in Sentiment Analysis -- A Support Vector Machine Approach to Detect Financial Statement Fraud in South Africa: A First Look -- Using Multi-agent Systems Simulations for Stock Market Predictions -- Customer Lifetime Value and Defection Possibility Prediction Model Using Machine Learning: An Application to a Cloud-Based Software Company -- Mining Class Association Rules with the Difference of Obidsets -- Multiple Model Approach to Machine Learning (MMAML 2014) -- Multi-Level Genetic-Fuzzy Mining with a Tuning Mechanism -- The Influence of a Classifiers’ Diversity on the Quality of Weighted Aging Ensemble -- Comparison of Ensemble Approaches: Mixture of Experts and AdaBoost for a Regression Problem -- The AdaBoost Algorithm with the Imprecision Determine the Weights of the Observations -- Vehicle Logo Recognition with an Ensemble of Classifiers -- Optimization Algorithms for One-Class Classification Ensemble Pruning -- Evaluation of Fuzzy System Ensemble Approach to Predict from a Data Stream -- Computational Intelligence (CI 2014) -- Genetic Transformation Techniques in Cryptanalysis -- On-the-Go Adaptability in the New Ant Colony Decision Forest Approach -- Bootstrapping and Rule-Based Model for Recognizing Vietnamese Named Entity -- A Family of the Online Distance-Based Classifiers -- Online Learning Based on Prototypes -- Reinforcement Learning Strategy for Solving the Resource-Constrained Project Scheduling Problem by a Team of A-Teams -- A Hybrid Cooperative and Reactive Search Approach for Vehicle Routing Problem with Time Windows -- Comparative Study on Bio-inspired Global Optimization Algorithms in Minimal Phase Digital Filters Design -- On Modelling Social Propagation Phenomenon -- Engineering Knowledge and Semantic Systems (IWEKSS 2014).-Design of a Performance Analyzer for Electric Vehicle Taxi Systems -- Item-Based Collaborative Filtering with Attribute Correlation: A Case Study on Movie Recommendation -- Linked Data Mashups: A Review on Technologies, Applications and Challenges -- Belief Propagation Method for Word Sentiment in WordNet 3.0 -- Innovations in Intelligent Computation and Applications (IICA 2014) -- A New Method for Autocratic Decision Making Using Group Recommendations Based on Intervals of Linguistic Terms and Likelihood-Based Comparison Relations -- Applying Fuzzy AHP to Understand the Factors of Cloud Storage Adoption -- A Novel Neural-Fuzzy Guidance Law Design by Applying Different Neural Network Optimization Algorithms Alternatively for Each Step -- Detection of Bus Routes Number in Bus Panel via Learning Approach -- Performance of an Energy Efficient Bandwidth Allocation for Wireless Communication Systems -- A Hiera
    Additional Edition: ISBN 9783319054575
    Additional Edition: Druckausg. ISBN 978-331-90545-7-5
    Language: English
    Keywords: Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    gbv_1653689110
    Format: Online-Ressource (XXXIV, 622 p. 212 illus, online resource)
    ISBN: 9783319054766
    Series Statement: Lecture Notes in Computer Science 8397
    Content: The two-volume set LNAI 8397 and LNAI 8398 constitutes the refereed proceedings of the 6th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2014, held in Bangkok, Thailand, in April 2014. The 125 revised papers presented were carefully reviewed and selected from 300 submissions. The papers address the following topics: natural language and text processing, intelligent information retrieval, semantic Web, social networks and recommendation systems, intelligent database systems, decision support systems, computer vision techniques, and machine learning and data mining. The papers are organized in topical sections on multiple model approach to machine learning, MMAML 2014, computational intelligence, CI 2014, engineering knowledge and semantic systems, IWEKSS 2014, innovations in intelligent computation and applications, IICA 2014, modeling and optimization techniques in information systems, database systems and industrial systems, MOT 2014, innovation via collective intelligences and globalization in business management, ICIGBM 2014, intelligent supply chains, ISC 2014, and human motion: acquisition, processing, analysis, synthesis and visualization for massive datasets, HMMD 2014
    Note: Literaturangaben , Part INatural Language and Text Processing A Meta-model Guided Expression Engine -- Text Clustering Using Novel Hybrid Algorithm -- Combination of Multi-view Multi-source Language Classifiers for Cross-Lingual Sentiment Classification -- Learning to Simplify Children Stories with Limited Data -- Clustering Based Topic Events Detection on Text Stream -- Nonterminal Complexity of Weakly Conditional Grammars -- Thai Grapheme-Phoneme Alignment: Many-to-Many Alignment with Discontinuous Patterns -- A New Approach for Mining Top-Rank-k Erasable Itemsets -- Intelligent Information Retrieval New Method for Extracting Keyword for the Social Actor -- Query Expansion Using Medical Subject Headings Terms in the Biomedical Documents -- Improving Health Question Classification by Word Location Weights -- Entity Recognition in Information Extraction -- Author Name Disambiguation by Using Deep Neural Network -- Incremental Refinement of Linked Data: Ontology-Based Approach -- Using Lexical Semantic Relation and Multi-attribute Structures for User Profile Adaptation -- Auto-Tagging Articles Using Latent Semantic Indexing and Ontology -- Evaluating Profile Convergence in Document Retrieval Systems -- Similarity Search among Real Valued Vectors -- Semantic Web, Social Networks and Recommendation Systems -- Finding the Cluster of Actors in Social Network Based on the Topic of Messages -- Geodint: Towards Semantic Web-Based Geographic Data Integration -- SPARQL - Compliant Semantic Search Engine with an Intuitive User Interface -- A General Model for Mutual Ranking Systems -- Automated Interestingness Measure Selection for Exhibition Recommender Systems -- Equivalent Transformation in an Extended Space for Solving Query-Answering Problems -- Knowledge Generalization during Hierarchical Structures Integration -- Design and Implementation of an Adaptive Tourist Recommendation System -- Improving Efficiency of PromoRank Algorithm Using Dimensionality Reduction -- A Framework to Provide Personalization in Learning Management Systems through a Recommender System Approach -- Intelligent Database Systems -- Agent-Based Modelling the Evacuation of Endangered Areas -- DPI: Dual Private Indexes for Outsourced Databases -- Anomaly SQL SELECT-Statement Detection Using Entropy Analysis -- Deriving Composite Periodic Patterns from Database Audit Trails -- Comparison of Stability Models in Incremental Development -- An Approach of Finding Maximal Submeshes for Task Allocation Algorithms in Mesh Structures -- A GA-Based Approach for Resource Consolidation of Virtual Machines in Clouds -- Problems of SUMO-Like Ontology Usage in Domain Modelling -- Intelligent Information Systems -- Implementation of Emotional-Aware Computer Systems Using Typical Input Devices -- An Item Bank Calibration Method for a Computer Adaptive Test -- Hybrid Approach to Web Based Systems Usability Evaluation -- Application of Network Analysis in Website Usability Verification -- Travel Password: A Secure and Memorable Password Scheme -- Performance Measurement of Higher Education Information System Using IT Balanced Scorecard -- Decision Support Systems -- Decisional DNA Based Framework for Representing Virtual Engineering Objects -- A Data Quality Index with Respect to Case Bases within Case-Based Reasoning -- Agent’s Autonomy Adjustment via Situation Awareness -- The Development of a Decision Support Model for the Problem of Berths Allocation in Containers Terminal Using a Hybrid of Genetic Algorithm and Simulated Annealing -- Sensitivity Analysis of a Priori Power Indices.-Artificial Neural Network Based Prediction Model of the Sliding Mode Control in Coordinating Two Robot Manipulators -- Comparison of Reproduction Schemes in Spatial Evolutionary Game Theoretic Model of Bystander Effect -- Ant Colony Optimization Algorithm for Solving the Provider - Modified Traveling Salesman Problem -- Controlling Quality of Water-Level Data in Thailand -- Application of Nonlinear State Estimation Methods for Sport Training Support -- Computer Vision Techniques -- Multiple Object Tracking Based on a Hierarchical Clustering of Features Approach -- A Copy Move Forgery Detection to Overcome Sustained Attacks Using Dyadic Wavelet Transform and SIFT Methods -- Methods for Vanishing Point Estimation by Intersection of Curves from Omnidirectional Image -- Human Detection from Mobile Omnidirectional Camera Using Ego-Motion Compensated -- Simple and Efficient Method for Calibration of a Camera and 2D Laser Rangefinder -- Iris Image Quality Assessment Based on Quality Parameters -- Contextual Labeling 3D Point Clouds with Conditional Random Fields -- Part I -- Categorization of Sports Video Shots and Scenes in TV Sports News Based on Ball Detection -- A Coral Mapping and Health Assessment System Based on Texture Analysis -- Navigation Management for Non-linear Interactive Video in Collaborative Video Annotation -- Machine Learning and Data Mining -- Intelligent Fuzzy Control with Multiple Constraints for a Model Car System with Multiplicative Disturbance -- The Design of Knowledge-Based Medical Diagnosis System for Recognition and Classification of Dermatoglyphic Features -- Exact Discovery of Length-Range Motifs -- Feature Reduction Using Standard Deviation with Different Subsets Selection in Sentiment Analysis -- A Support Vector Machine Approach to Detect Financial Statement Fraud in South Africa: A First Look -- Using Multi-agent Systems Simulations for Stock Market Predictions -- Customer Lifetime Value and Defection Possibility Prediction Model Using Machine Learning: An Application to a Cloud-Based Software Company -- Mining Class Association Rules with the Difference of Obidsets -- Multiple Model Approach to Machine Learning (MMAML 2014) -- Multi-Level Genetic-Fuzzy Mining with a Tuning Mechanism -- The Influence of a Classifiers’ Diversity on the Quality of Weighted Aging Ensemble -- Comparison of Ensemble Approaches: Mixture of Experts and AdaBoost for a Regression Problem -- The AdaBoost Algorithm with the Imprecision Determine the Weights of the Observations -- Vehicle Logo Recognition with an Ensemble of Classifiers -- Optimization Algorithms for One-Class Classification Ensemble Pruning -- Evaluation of Fuzzy System Ensemble Approach to Predict from a Data Stream -- Computational Intelligence (CI 2014) -- Genetic Transformation Techniques in Cryptanalysis -- On-the-Go Adaptability in the New Ant Colony Decision Forest Approach -- Bootstrapping and Rule-Based Model for Recognizing Vietnamese Named Entity -- A Family of the Online Distance-Based Classifiers -- Online Learning Based on Prototypes -- Reinforcement Learning Strategy for Solving the Resource-Constrained Project Scheduling Problem by a Team of A-Teams -- A Hybrid Cooperative and Reactive Search Approach for Vehicle Routing Problem with Time Windows -- Comparative Study on Bio-inspired Global Optimization Algorithms in Minimal Phase Digital Filters Design -- On Modelling Social Propagation Phenomenon -- Engineering Knowledge and Semantic Systems (IWEKSS 2014).-Design of a Performance Analyzer for Electric Vehicle Taxi Systems -- Item-Based Collaborative Filtering with Attribute Correlation: A Case Study on Movie Recommendation -- Linked Data Mashups: A Review on Technologies, Applications and Challenges -- Belief Propagation Method for Word Sentiment in WordNet 3.0 -- Innovations in Intelligent Computation and Applications (IICA 2014) -- A New Method for Autocratic Decision Making Using Group Recommendations Based on Intervals of Linguistic Terms and Likelihood-Based Comparison Relations -- Applying Fuzzy AHP to Understand the Factors of Cloud Storage Adoption -- A Novel Neural-Fuzzy Guidance Law Design by Applying Different Neural Network Optimization Algorithms Alternatively for Each Step -- Detection of Bus Routes Number in Bus Panel via Learning Approach -- Performance of an Energy Efficient Bandwidth Allocation for Wireless Communication Systems -- A Hiera
    Additional Edition: ISBN 9783319054759
    Additional Edition: Druckausg. ISBN 978-331-90547-5-9
    Language: English
    Keywords: Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Cham : Springer International Publishing AG
    UID:
    kobvindex_INTEBC5771128
    Format: 1 online resource (448 pages)
    Edition: 1st ed.
    ISBN: 9783030122591
    Note: Designing Digital Work -- Preface and Acknowledgments -- Contents -- List of Figures -- List of Tables -- 1: Introduction -- 1.1 Conceptual Foundations-An Overview -- 1.2 Knowledge Lifecycle -- 1.3 Articulation Work -- 1.4 Model-Centered Learning -- 1.5 Collaborative Multi-perspective Modeling -- 1.6 Natural Versus Techno-Centric Modeling -- 1.7 Taking an Integrated Socio-technical System Perspective -- References -- 2: Elicitation Requirements -- 2.1 Setting the Stage-Awareness on Roles and Their Management -- 2.2 Situation Awareness -- 2.3 Conceptual Understanding of Complex Systems -- 2.4 Creating a Reflective Practice for Situations-to-Be -- 2.5 Focusing While Utilizing Multiple Perspectives -- 2.6 Articulating Intangible Assets -- 2.7 Engage in Alignment for Collective Intelligence -- 2.8 Synthesis -- References -- 3: Value-Oriented Articulation -- 3.1 Shaping Role Identities Through Contextual Behavior Articulation -- 3.1.1 Start Simple, Using Natural Language -- 3.1.2 Roles As Semantic and Pragmatic Entities -- 3.1.3 Acting in a Specific Role-Pragmatic Modeling -- 3.1.3.1 The World As Network of Roles -- 3.1.3.2 Articulation by Stepwise Behavior Abstractions -- 3.1.4 Conclusive Summary -- 3.2 Sorting Out: Cards As Carrier of Functions and Interaction -- 3.2.1 Articulation Concepts -- 3.2.2 Articulation Process -- 3.2.3 Mapping to Subject-Oriented Models -- 3.3 On the Go: Capturing Functions and Interactions While Working -- 3.4 Capturing Tangibles and Intangible Exchange Relationships -- 3.4.1 Organizations As Transactional Networks of Roles -- 3.4.2 Tangible and Intangible Transactions -- 3.5 Cross-Cutting Issues -- References -- 4: Alignment of Multiple Perspectives: Establishing Common Ground for Triggering Organizational Change -- 4.1 Alignment Concept and Principles , 4.2 Towards Direct Stakeholder Support-Minimizing Semantic Distance -- 4.3 Alignment Scheme -- 4.4 Alignment Approaches -- 4.4.1 Example: Ex-ante Communication Alignment -- 4.4.2 Example: Ongoing Communication Alignment -- 4.5 Alignment Practice: Ex-post Communication Alignment with CoMPArE/WP -- 4.5.1 Component 1-Setting the Stage -- 4.5.2 Component 2-Articulation and Alignment -- 4.5.2.1 Step 1: Individual Articulation -- 4.5.2.2 Step 2: Collaborative Consolidation -- 4.5.3 Component 3-Refinement via Virtual Enactment -- 4.5.4 Transition from Modeling to Enactment -- 4.6 Conclusion -- References -- 5: Acting on Work Designs: Providing Support for Validation and Implementation of Envisioned Changes -- 5.1 Creating Executable Models Through Scaffolding Articulation and Alignment -- 5.1.1 Scaffolding -- 5.1.2 Scaffolds for Stakeholder-Centric Work Modeling -- 5.1.2.1 Scaffolding the Articulation of Models -- 5.1.2.2 Scaffolding Argumentative Collaboration for Alignment -- 5.1.3 A Framework for Scaffolding Model Articulation and Alignment -- 5.1.4 Scaffolding Articulation and Alignment in CoMPArE/WP -- 5.1.5 Example -- 5.2 Participatory Enactment Support Instrument -- 5.2.1 Background: Process Walk-Throughs and Enacted Prototypes -- 5.2.2 Implications of Enacting Dynamically Changeable Prototypes -- 5.2.3 Tool Support -- 5.2.3.1 Conceptual Considerations -- 5.2.3.2 Architecture -- 5.2.3.3 VirtualEnactment Core -- 5.2.3.4 Visualization Engine -- 5.2.3.5 Elaboration Engine -- 5.2.3.6 Simulated Enactment Engine -- 5.2.3.7 Scaffolding Prompting Engine -- 5.2.4 Conclusive Summary -- 5.3 S-BPM-Driven Execution of Actor-Centric Work Processes -- 5.3.1 S-BPM Activity Bundles in the Business Processing Environment -- 5.3.2 S-BPM Activity Bundles in the Knowledge Processing Environment -- 5.3.3 Tool Support -- 5.4 Synthesis , References -- 6: Enabling Emergent Workplace Design -- 6.1 Articulation Work and Mental Models -- 6.2 Mental Models Theory and Articulation Work for Organizational Learning -- 6.3 Towards an Integrated Framework -- 6.3.1 Relevant Concepts -- 6.3.2 Implementation of Work Processes -- 6.3.3 Responsibilities and Skills -- 6.3.4 Towards Instantiation -- 6.3.5 Behavioral Interfaces for Interaction Coordination -- 6.3.6 Behavioral Constraints for Individual Actions -- 6.3.7 Varying Degrees of Freedom in Individual Activity -- 6.4 Articulation Engineered for Organizational Learning -- 6.4.1 Featuring OL Processes -- 6.4.2 Support for Repository Access -- 6.4.3 Process Knowledge Elicitation and Knowledge Claim Development -- 6.4.3.1 In-situ Process Collection, Adaptation, and Refinement -- 6.4.3.2 Process Knowledge Collection, Reflection, and Alignment -- 6.4.4 Process Visualization for Elicitation and Reflection -- 6.4.5 Process Validation and Simulation for Reflection and Alignment -- 6.5 Conclusion -- References -- 7: Putting the Framework to Operation: Enabling Organizational Development Through Learning -- 7.1 Sample Actor-Centric Tool Support for Articulation and Elicitation -- 7.1.1 Comprehand Cards -- 7.1.2 Comprehand Table -- 7.1.3 Collaborative Model Articulation and Exploration -- 7.2 Sample Actor-Centric Tool Support for Representation -- 7.2.1 Representing Role Knowledge and Descriptive Meta-knowledge -- 7.2.2 Representing Conceptual Meta-knowledge -- 7.2.3 Enabling the Assessment of Cognitive Meta-knowledge -- 7.3 Sample Actor-Centric Tool Support for Intelligent Content Manipulation -- 7.4 Sample Actor-Centric Tool Support for Processing Work Models -- 7.5 Towards Seamless Tool Support-A Showcase -- 7.5.1 Articulation and Elicitation -- 7.5.2 Representation -- 7.5.3 Manipulation -- 7.5.4 Processing , 7.6 Conclusions -- References -- 8: Case Studies -- 8.1 Categorical Knowledge Building Support-A Planning Case -- 8.1.1 Sample Case -- 8.1.2 Insights -- 8.2 CoMPArE/WP Facilitating Project-Based Business Operation -- 8.2.1 Sample Case -- 8.2.1.1 Component 1: Setting the Stage -- 8.2.1.2 Component 2.1: Individual Articulation -- 8.2.1.3 Component 2.2: Collaborative Consolidation -- 8.2.1.4 Component 3: Virtual Enactment -- 8.2.2 Observed Effects -- 8.2.3 Insights -- 8.3 Articulating and Aligning Digital Learning Support Features -- 8.3.1 Articulation Support of Intentional Education -- 8.3.1.1 'Open' or Non-directed Elicitation and Reflection -- 8.3.1.2 Setting Up Didactic Requirements -- 8.3.2 Developing Digital Learning Support Baselines (Course and Content Models) -- 8.3.3 Semantic Navigation -- 8.3.4 Alignment in User-/Usage-Oriented Design Spaces -- 8.3.5 Insights from the Case -- 8.4 Subject-Oriented Organizational Management -- 8.4.1 Organizational Management -- 8.4.2 Subjects As Carrier of Work Behavior -- 8.4.3 Essential Principles -- 8.4.3.1 Identifying Meaningful Entities -- 8.4.3.2 Conveying Meaning to Others -- 8.4.3.3 Aligning People -- 8.4.4 Structuring Articulation -- 8.4.4.1 Cascading Perspectives -- 8.4.5 Sample Applications -- 8.4.6 Insights from the Case -- References -- 9: Epilogue -- References -- Ontological Glossary -- Index
    Additional Edition: Print version Oppl, Stefan Designing Digital Work Cham : Springer International Publishing AG,c2019 ISBN 9783030122584
    Language: English
    Keywords: Electronic books
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    b3kat_BV048523169
    Format: 1 Online-Ressource (509 Seiten)
    ISBN: 9783030764937
    Series Statement: Internet of Things Ser
    Note: Intro -- Introduction -- Contents -- Emerging Trends of AI and IoV -- The Fundamentals and Potential of the Internet of Vehicles (IoV) in Today's Society -- 1 Introduction -- 2 Methodology -- 3 Internet of Vehicles (IoV) Concept -- 3.1 Types of Vehicle Networks -- 3.2 IoV Applications -- 3.3 Information Technology Integrated with Automation Technology for IoV -- 4 IoV Communication Networks -- 4.1 V2V (Vehicles with Vehicles) -- 4.2 V2R (Vehicles with Infrastructure) -- 4.3 V2X (Vehicles with Internet (Cloud)) -- 4.4 VANETs (Vehicular Ad Hoc Networks) -- 5 IoV Architecture -- 5.1 Advantages and Benefits of IoV -- 5.2 Challenges for Implantation of IoV Structure -- 6 Discussion -- 7 Conclusions -- 8 Trends -- References -- AI-Enabled IoV Applications and Systems -- Intelligent Approaches for Fault-Tolerance in Radio Communication of Autonomous Vehicles -- 1 Introduction -- 2 Problem Overview -- 3 Radio Technology Usage in Autonomous Vehicles -- 3.1 Radio Technologies in AV -- 3.2 The General Fault-Tolerance Process -- 3.3 Existing Fault-Tolerant Radio Technologies in AV -- 4 Artificial Intelligence as a Tool for Fault-Tolerance -- 4.1 Artificial Reasoning -- 4.2 Artificial Learning -- 5 Case Study -- 5.1 Propagated-Fault Detection -- 5.2 Fault Diagnosis and Recovery -- 6 Thoughts About AI Application to Wireless Propagated Fault Management -- 7 Future Challenges and AI Opportunities Toward Reliable Autonomous Vehicles -- 8 Conclusion -- References -- AI-Based Traffic Queue Detection for IoV Safety Services in 5G Networks -- 1 Motivation -- 2 From the Biological Neurons to the Artificial Neural Networks -- 2.1 Convolutional Neural Network: A Model of the Visual Cortex -- 3 Object Detection -- 3.1 Two-Stage Object Detection -- 3.2 One-Stage Object Detection -- 3.3 The Final Choice -- 4 Realization of the Traffic Queue Detector -- 4.1 YOLOv3 , 4.2 SORT -- 4.3 Direction of Movement Detector -- 4.4 Traffic Queue Detector -- 4.5 Comparison Between the Two Solutions -- 4.6 Considerations on the Choice of Parameters -- 5 Conclusion and Future Perspective -- References -- Internet of Vehicles - System of Systems Distributed Intelligence for Mobility Applications -- 1 Introduction -- 2 Concept and Related Work -- 3 ECAS Vehicle Capabilities, Technologies, and Architectures -- 3.1 Vehicles Architecture Evolution -- 4 IoV 3D Multi-layered Architecture -- 4.1 IoV Functional Layers -- 4.2 IoV Trustworthiness Properties -- 4.3 IoV System Characteristics -- 5 Design Issues in Implementing the IoV Architecture -- 5.1 AI-Based Design and Technologies -- 5.2 Fail-Operational Design -- 5.3 End-to-End Security -- 5.4 Intelligent Connectivity for IoV -- 6 Future Research Challenges -- 7 Conclusions -- References -- Software-Defined Networking/Network Function Virtualization -- Cross Network Slicing in Vehicular Networks -- 1 Introduction to Network Slicing and SDN -- 1.1 What Is Network Slicing? -- 1.2 Network Slicing Enabling Technologies -- 1.3 Network Slicing as a Solution -- 1.4 Network Slicing from Business Perspective -- 1.5 Network Slicing Architecture -- 1.6 Software Defined Networking (SDN) -- 2 Network Slicing in Vehicular Networks -- 2.1 In-Vehicle Network Slicing -- 2.2 VANETs Slicing -- 3 Applications of Vehicular Network Slicing -- 3.1 Vehicle-to-Everything (V2X) Slices -- 3.2 Real-World Scenario with V2X Network Slicing -- 4 Intelligent Network Slicing -- 4.1 Machine Learning in Network Slicing -- 4.2 Smart Vehicular Network Slicing -- 5 Challenges and Open Issues -- 6 Conclusion -- References -- Towards Artificial Intelligence Assisted Software Defined Networking for Internet of Vehicles -- 1 Introduction -- 2 Background -- 2.1 Internet of Vehicles , 2.2 Standard Traditional Vehicular Router Design and Networking -- 2.3 Software Defined Networking (SDN) -- 3 Benefits of SDN -- 4 Towards SDN Architecture for IoV -- 4.1 Present Architecture for SDN -- 4.2 SDN Architecture Mapping to IoV -- 4.3 Modified SDN Architecture Mapping to IoV -- 5 The State of the Art for SDN Enabled IoV -- 6 Limitations and Possible Solutions -- 7 Automatic Configuration Framework for SDN Enabled IoV -- 7.1 Assumptions -- 7.2 Requirements -- 7.3 Deployed Solutions -- 7.4 Proposed Automatic Configuration Method -- 8 AI Assisted SDN Enabled IoV -- 8.1 Data Collection -- 8.2 AI Management in IoV -- 8.3 AI Assisted Framework for SDN Enabled IoV -- 9 Experimental Scenario and Results -- 9.1 Emulation Scenarios -- 9.2 Emulation Results -- 10 Open Challenges for SDN in IoV -- 10.1 Transition from Non-SDN IoV to SDN IoV -- 10.2 Performance -- 10.3 Mobility -- 10.4 Security -- 11 Conclusions -- References -- IoV with ML/DL Technologies -- Machine Learning Technologies in Internet of Vehicles -- 1 Introduction -- 2 Background and Motivation -- 3 AI in IoV Network -- 3.1 AI for IoV Multimedia Communication -- 3.2 Intelligent IoV Edge Based Algorithm -- 3.3 AI for Vehicle to Everything -- 4 AI enabled QoE/QoS Optimization -- 4.1 Buffer Aware QoE/QoS Optimization -- 4.2 Energy Aware QoE/QoS Optimization -- 5 ML Algorithms in IoV Network -- 5.1 ML Based Edge Caching Mechanisms for IoV -- 5.2 Deep Reinforcement Learning Based Offloading Algorithm -- 5.3 ML for Dynamic and High Mobility IoV -- 5.4 ML Based Decision Making in IoV -- 6 Machine Learning Applications in IoV -- 6.1 Intelligent Autonomous Driving -- 6.2 Deep Learning for Driver Safety and Assistance -- 6.3 ML in Smart Transportation -- 7 Future Directions and Tentative Solutions -- 8 Conclusion -- References -- Deep Learning Approaches for IoV Applications and Services , 1 Introduction -- 2 The Evolution of Deep Learning in IoT -- 3 Distributed Machine Learning Systems -- 3.1 Distributed Machine Learning Architecture -- 3.2 Parallelization Algorithms -- 3.3 Fast Optimization Algorithms -- 4 Internet of Vehicles DL Applications and Services -- 5 Convolutional Artificial Neural Networks (CANN) -- 5.1 The IoV Multilayer Perceptron's (MLPs) -- 5.2 CANN IoV Architectures -- 5.3 CANN IoV Algorithms -- 6 Recurrent Neural Networks (RNNs) -- 7 Deep Reinforcement Learning for IoV Network -- 7.1 Energy Efficiency and Operation of Scheduling -- 7.2 Resources Allocation and Management -- 7.3 Optimization Performance -- 8 Deep Learning Driven IoV Networks -- 8.1 DL Driven Network-Level Internet of Vehicle Data Analysis -- 8.2 DL Driven App-Level Internet of Vehicle Data Analysis -- 8.3 DL IoV Systems Clustering Procedures and Protocols -- 8.4 IoV Network Control Based DL -- 8.5 Predictive Analytics "Regression" Issues in DL -- 9 ML Future Directions and Challenges in IoV Applications -- 10 Conclusion -- References -- Intelligently Reduce Transportation's Energy Consumption -- 1 Introduction -- 1.1 Internet of Vehicles (IoV) -- 1.2 Literature Review -- 2 Fluid Dynamics -- 2.1 Physical Approach -- 2.2 Fluid Flow in the Grid -- 3 Methodology -- 3.1 Implementation -- 3.2 Visual Presentation -- 3.3 Mathematical Approach -- 4 Summary -- 5 Conclusion and Future Work -- References -- Security and Privacy -- Blockchain-Based Internet-of-Vehicle -- 1 Introduction -- 2 Background -- 2.1 Overview on Blockchains -- 2.2 Blockchain-Based IoV -- 2.3 Blockchain-Based Supporting AI in IoV -- 3 Blockchain Support for Data Sharing -- 3.1 Incentive Announcement Protocol -- 3.2 Smart Contracts in Incentives and Data Sharing -- 4 Blockchain Support for IoV Trust Management -- 4.1 Lightweight Authentication Mechanism -- 4.2 Traffic Events Verifications , 5 Blockchain Support for Applications -- 5.1 Accident Detection -- 5.2 Forensics Application -- 5.3 Charging Application for Electronic Vehicles -- 5.4 Carpooling and Platooning -- 6 Open Issues and Future Directions -- 7 Lessons Learned and Conclusion -- References -- Vehicle Guidance System Based on Secure Mobile Communication -- 1 Introduction -- 2 Problem and Contribution -- 2.1 Requirements for a Vehicle Guidance System -- 2.2 State of the Art -- 2.3 Methodological and Statistical Challenges of Vehicular Networks -- 2.4 Research Question -- 3 Introducing SIKAF: The Communications Architecture for Vehicle Guidance Systems -- 3.1 Organization -- 3.2 Implementation -- 3.3 Cryptography -- 4 Results -- 4.1 Hardware for Prototype -- 4.2 Formal Language for Messages -- 4.3 Message Size -- 4.4 Required Amount of Keys -- 4.5 Processing Time -- 5 Conclusion -- 5.1 Classification of the Architecture -- 5.2 Possibilities and Limitations of the Architecture -- 6 Discussion -- 6.1 Possible Extensions -- 6.2 New Concepts for Decentralized Autonomous Systems -- References -- Attack Models and Countermeasures for Autonomous Vehicles -- 1 Introduction -- 2 Attack Surfaces and Potential Threats -- 2.1 Electronic Control Units (ECUs) -- 2.2 Sensors -- 2.3 Intra-vehicular Links -- 2.4 Inter-vehicular Links -- 2.5 Attack Summary -- 3 Existing Countermeasures -- 3.1 Solutions for ECU Attacks -- 3.2 Solutions for Sensor Attacks -- 3.3 Solution for Intra-vehicular Link Attacks -- 3.4 Solutions for Inter-vehicular Link Attacks -- 4 Future Directions -- 4.1 Open Issues -- 4.2 Future Directions -- 5 Conclusion -- References -- Routing Protocols -- VASNET Routing Protocol in Crisis Scenario Based on Carrier Vehicle -- 1 VANET Introduction -- 1.1 Topology Based Routing Protocols -- 1.2 Position Based Routing Protocols or Geographic Routing -- 1.3 Broadcast Routing , 1.4 Geocast Routing
    Additional Edition: Erscheint auch als Druck-Ausgabe Magaia, Naercio Intelligent Technologies for Internet of Vehicles Cham : Springer International Publishing AG,c2021 ISBN 9783030764920
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    Keywords: Internet der Dinge ; Künstliche Intelligenz ; Integrierte Software
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    b3kat_BV048830790
    Format: 1 Online-Ressource (457 Seiten)
    ISBN: 9783030943431
    Series Statement: Lecture Notes in Business Information Processing Ser. v.436
    Note: Description based on publisher supplied metadata and other sources , Intro -- Preface -- Organization -- Contents -- 5th International Workshop on Artificial Intelligence for Business Process Management (AI4BPM 2021) -- 5th International Workshop on Artificial Intelligence for Business Process Management (AI4BPM 2021) -- Organization -- Organizing Committee -- Program Committee -- On the Use of Knowledge Graph Completion Methods for Activity Recommendation in Business Process Modeling -- 1 Introduction -- 2 Related Work -- 3 Activity Recommendation Through Knowledge Graph Completion -- 3.1 Problem Definition -- 3.2 Knowledge Graph Construction -- 4 Experimental Study -- 4.1 Dataset -- 4.2 Evaluation Setup -- 4.3 Results -- 5 Conclusion and Future Work -- References -- Creating Unbiased Public Benchmark Datasets with Data Leakage Prevention for Predictive Process Monitoring -- 1 Introduction -- 2 Related Work -- 3 Approach -- 4 Experimental Setup -- 4.1 Preliminaries -- 4.2 Datasets -- 4.3 Models -- 5 Constructing Benchmark Datasets -- 5.1 Target Definition -- 5.2 Elimination of Chronological Outliers and Duplicates -- 5.3 Debiasing the End of the Dataset -- 5.4 Choice of Test Set -- 5.5 Temporal Splitting -- 5.6 Debiasing the Beginning of the Test Set -- 5.7 Removal of Long Cases -- 5.8 Next Event Prediction -- 6 Model Predictions -- 7 Conclusion and Future Work -- References -- Exploring Gated Graph Sequence Neural Networks for Predicting Next Process Activities -- 1 Introduction -- 2 Background -- 2.1 Preliminaries -- 2.2 Related Work -- 3 Gated Graph Sequence NNs for Next Activity Prediction -- 3.1 Three Representation Forms of Process Instance Graphs -- 3.2 Learning Gated Graph Sequence Neural Network Models -- 4 Evaluation -- 4.1 Event Logs -- 4.2 Procedure -- 4.3 Results -- 5 Discussion -- 6 Conclusion -- References , ProGAN: Toward a Framework for Process Monitoring and Flexibility by Change via Generative Adversarial Networks -- 1 Introduction -- 2 Foundations and Related Work -- 2.1 Semantic Graph Process Representation -- 2.2 Generative Adversarial Networks -- 2.3 MAPE-K Control Loops -- 2.4 Related Work -- 3 Implementing MAPE-K Control Loops with GANs -- 3.1 Training Procedure and Data -- 3.2 Usage of Generator and Discriminator in MAPE-K Control Loops -- 4 Application Scenario: Using GANs to Implement MAPE-K Control Loops -- 5 Conclusion and Future Work -- References -- 17th International Workshop on Business Process Intelligence (BPI 2021) -- 17th International Workshop on Business Process Intelligence (BPI 2021) -- Organization -- Workshop Chairs -- Program Committee -- Conformance Checking: A Systemic View -- 1 Introduction -- 2 Running Example -- 3 Alignments: A Systemic View -- 4 The Computational Challenge -- 5 Conclusion and Future Work -- References -- A Distance Measure for Privacy-Preserving Process Mining Based on Feature Learning -- 1 Introduction -- 2 Background -- 2.1 Event Logs -- 2.2 Event Log Anonymization with PRETSA -- 2.3 The Act2Vec Model -- 3 An Embedding-Based Trace Distance Measure for Event Log Anonymization -- 3.1 Intuition -- 3.2 A Distance Measure for Traces Based on Embeddings -- 4 Evaluation -- 4.1 Dataset -- 4.2 Experimental Setup -- 4.3 Results -- 5 Related Work -- 6 Conclusion -- References -- Towards Understanding the Role of the Human in Event Log Extraction -- 1 Introduction -- 2 Background -- 3 Research Method -- 3.1 Literature Study -- 3.2 Coding and Taxonomy Derivation -- 4 A Taxonomy for Manual Tasks in Event Log Extraction -- 4.1 Overview -- 4.2 Context and Scope Definition -- 4.3 Data Source Assessment -- 4.4 Attribute Selection -- 4.5 Data Source Extraction -- 4.6 Event Log Assessment -- 5 Discussion -- 6 Conclusion , References -- May I Take Your Order? -- 1 Introduction -- 2 Related Work -- 3 On the Interplay Between Time and Order in Process Mining -- 3.1 Event Logs with Time and Order -- 3.2 Consistency -- 3.3 Simplified Event Logs -- 4 What if Timestamps Are Imprecise? -- 5 Implementation -- 6 Conclusion -- References -- Attribute-Driven Case Notion Discovery for Unlabeled Event Logs -- 1 Introduction -- 2 Preliminaries and Running Example -- 3 Related Work -- 4 Attribute-Driven Case Notion Discovery -- 4.1 Event Log Subdivision -- 4.2 Class Instance Detection -- 4.3 Trace Generation -- 5 Evaluation -- 6 Conclusion -- References -- Demystifying Noise and Outliers in Event Logs: Review and Future Directions -- 1 Introduction -- 2 Noise vs. Outliers -- 3 Literature Search -- 3.1 Literature Result: Type of Outliers and Noise -- 3.2 Literature Result: Outlier Detection Techniques -- 4 Analysis of Tools for Noise and Outlier Filtering for Event Logs -- 5 Future Research Directions -- 6 Related Work -- 7 Conclusion and Future Directions -- References -- 1st International Workshop on BPM Governance for and Beyond Digital Transformation (BPMGOV 2021) -- 1st International Workshop on BPM Governance for and Beyond Digital Transformation (BPMGOV 2021) -- Organization -- Program Chairs -- Program Committee -- Process Innovation in the EU Public Sector Through the Lens of BPM Ambidexterity -- 1 Introduction -- 2 Literature -- 2.1 Business Process Management Ambidexterity -- 2.2 Process Innovation in the Public Sector -- 3 Methodology -- 3.1 Case Description -- 3.2 Data Collection -- 3.3 Validity and Reliability -- 4 Results -- 4.1 Triggers and Obstacles for Process Improvement (RQ1) -- 4.2 Ambidexterity Practices Linked to Maturity (RQ2) -- 4.3 Contextual Factors (RQ3) -- 4.4 Solutions to Ambidexterity Tensions (RQ4) -- 5 Discussion -- 6 Conclusion -- References , The BPM Governance Supporting Factors and Implementation Barriers - The Experience of a Public University -- 1 Introduction -- 2 BMP and BPM Governance in the Public Sector - Theoretical Background -- 3 Materials and Methods -- 3.1 Research Object -- 3.2 Characteristics of BPM and BPM Governance Implementation at a Higher Education Institution -- 4 Results and Discussion -- 4.1 Characteristics of BPM, BOMG and BSC Implementation Stages -- 5 Conclusion -- References -- About a Process-Technology Fit for Process Improvements in an Ambidextrous Environment -- 1 Introduction -- 2 Research Background and Theoretical Framework -- 2.1 Task-Technology Fit Theory -- 2.2 Ambidexterity Theory -- 2.3 Business Process Management (BPM) Context Factors -- 2.4 Other Theories Related to 'Fit' -- 2.5 Performance Metrics (or Fit Outcomes) -- 2.6 Initial Research Model -- 3 Methodology -- 3.1 Selection of Experts -- 3.2 Operationalization of Variables -- 3.3 Data Analysis -- 4 Results -- 4.1 Themes for Process and Technology Characteristics -- 4.2 Themes for Ambidextrous BPM -- 4.3 Themes for Process-Technology Fit -- 4.4 Themes for Mediating and Performance Variables -- 5 Discussion -- 6 Conclusion -- References -- Exploring the Key Factors of Process Improvement that Drive Competitive Advantage: A Case of Serbia -- 1 Introduction -- 2 Theoretical Background -- 3 Research Methodology -- 4 Results -- 4.1 Sample Caracteristic -- 4.2 Data Analysis and Results -- 5 Discussion and Conclusion -- References -- 1st International Workshop on Business Process Management and Routine Dynamics (BPM& -- RD 2021) -- 1st International Workshop on Business Process Management and Routine Dynamics (BPM& -- RD 2021) -- References -- Organization -- Workshop Chairs -- Program Committee -- Expanding Modeling Notations: Requirements for Creative Process Modeling -- 1 Introduction , 2 Understanding Creative Work -- 2.1 Example of a Level Design from a Game Design Process -- 2.2 Characteristics of Creative-Intensive Processes -- 3 Modelling Creative Work -- 3.1 Modeling Languages Capturing Creative Work -- 3.2 Modeling Extensions to Capture Creative Work -- 4 Conclusion -- References -- Analyzing Digital Trace Data to Promote Discovery - The Case of Heatmapping -- 1 Introduction -- 2 Discovery in Routine Dynamics and Business Process Management Research -- 3 Using Heatmapping to Promote Discovery -- 3.1 Heatmapping -- 3.2 How to Use Heatmapping to Promote Discovery? -- 4 Conclusion -- 4.1 Promoting Discovery in Business Process Management -- 4.2 Enriching the Repertoire of Methods in Routine Dynamics -- 4.3 Driving Discovery Through Visualization -- References -- Predicting Process Structure After a Disruption: An Example from the Clinical Documentation Process -- 1 Introduction -- 2 Background -- 2.1 Routine Dynamics as Network Dynamics -- 2.2 Research Setting and Data -- 2.3 Two Levels of Granularity -- 3 Hypothesis Development -- 3.1 Frequency of Handoffs -- 3.2 Speed of Handoffs -- 3.3 Paths and Betweenness -- 3.4 Coherence -- 4 Formal Model -- 5 Results -- 5.1 Frequency of Handoffs (H1) -- 5.2 Duration of Handoffs (H2) -- 5.3 Betweenness of Handoffs (H3) -- 5.4 Coherence of Handoffs (H4) -- 5.5 Changes in the Base Rate of Actions -- 6 Discussion -- 7 Conclusion -- References -- Capabilities for Digital Process Innovation: Results of an Ongoing Action Research Study -- 1 Introduction -- 2 Theoretical Background -- 2.1 Digital Process Innovation -- 2.2 Organizational Digital Process Innovation Capabilities -- 2.3 Skills Needed for Digital Process Innovation -- 3 Research Approach -- 3.1 Methodology and Case Background -- 4 Preliminary Results -- 5 Concluding Discussion -- References , Digital Twin of an Organization: Are You Serious?
    Additional Edition: Erscheint auch als Druck-Ausgabe Marrella, Andrea Business Process Management Workshops Cham : Springer International Publishing AG,c2022 ISBN 9783030943424
    Language: English
    Subjects: Economics
    RVK:
    Keywords: Prozessmanagement ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Cham : Springer International Publishing AG
    UID:
    kobvindex_INTEBC5589212
    Format: 1 online resource (214 pages)
    Edition: 1st ed.
    ISBN: 9783319193663
    Note: Intro -- Foreword -- Preface -- Contents -- Contributors -- Abbreviations -- Chapter 1: Innovative Technologies for an Engaging Classroom (iTEC) -- Rationale for Re-engineering the Uptake of ICT in Schools -- Supporting the Uptake of ICT in Schools -- The Future Classroom Toolkit -- A Teacher Education Network and Emerging Network of Future Classroom Labs -- A Future Classroom Ambassadors Scheme -- Continuing Professional Development -- Continued and Related Research and Development -- Influencing National Policy and Strategy -- Assessment by a Group of Senior Advisors -- Implementation Challenges -- Different Results in Different Countries -- Suggesting the Results of iTEC Are Influenced by Classroom Self-selection -- Cost of Scaling Up Teacher Training -- Getting the Message and Language Correct for the Diverse Political Contexts of Europe -- Investment in Prototypes -- Strengths Supporting Implementation -- Engagement of Teachers at Low Cost -- Innovation in Practice Involving a Large Number of Teachers -- Promoting Teacher Community Collaboration -- Focus on Learning and Teaching, Cross-Curriculum and Cross Age Group -- Conclusions -- References -- Chapter 2: Development of the Future Classroom Toolkit -- Introduction -- The Challenge to Innovate -- Overview of Scenarios, and Scenario Development and Monitoring Process -- The Theoretical Basis for the iTEC Scenario Development Method -- The Evolution of the Scenario Development Process -- Cycles 1 and 2 -- Cycle 3 -- Cycle 4 -- Cycle 5 -- The Future Classroom Toolkit -- The Maturity Model -- Rationale for the Development of the Future Classroom Toolkit -- Future Classroom Toolkit -- The Future Classroom Toolkit Development Method -- Innovation with Respect to the Toolkit Process -- Overcoming the Barriers to Innovation Within iTEC -- A Reflection on the Scenario Development Process , Scenario Development in the Context of iTEC Goals -- The Tangible and Intangible Benefits of the Scenario Development Process -- Conclusion -- References -- Chapter 3: Designing Edukata, a Participatory Design Model for Creating Learning Activities -- Introduction: Design and Pedagogical Research -- Designing Learning Activities for Piloting -- The Design Process -- An Example of a Surprising Design Outcome: TeamUp -- Creating the Concept of Learning Activities -- Evaluation Results -- Packaging the Design-Based Research Method for Teachers -- Conclusion: Edukata -- References -- Chapter 4: The iTEC Technical Artefacts, Architecture and Educational Cloud -- Rationale for the Educational Cloud and Technical Artefacts -- Technical Artefacts -- Innovations in Support for Learning Design -- Innovations in the Use of A-Typical Resources for Learning -- Innovation in the Integration and Management of Learning Services and Resources -- The iTEC Technical Architecture -- The User Management and Access Control system -- Designed Solution -- UMAC Server -- UMAC Filter -- UMAC Library -- Sharing Data -- iTEC-PDH request -- iTEC-PDH Response -- Conclusions -- References -- Chapter 5: The Composer: Creating, Sharing and Facilitating Learning Designs -- Motivation and Research Methodology -- Problem Identification and Requirements -- From an Initial Idea to an Agreed User Story -- Conceptual Foundations and User Roles -- Schools as Educational Context -- Functional and Non-functional Requirements -- Implementation of a Widget-Based Solution -- Representing Learning Designs via Widgets -- Authoring Widget-Based Learning Designs with the Composer -- Sharing Learning Designs via the Widget Store -- Facilitating Learning Designs with a Widget Run-Time Environment -- Evaluation and Outlook -- References -- Chapter 6: Recommender Systems -- Introduction -- Background , Multi-criteria Recommender Systems -- Semantic Recommender Systems -- Context-Aware Recommender Systems -- The iTEC Ontology -- Tools Characterisation -- Events Characterisation -- People Characterisation -- The iTEC Cloud -- The SDE -- The Learning Context -- Recommendation Process -- Selection and Weighting of Factors -- Enrichment of Semantic Knowledge Base -- Overall Description -- Source Localization and Definition of Information Extraction Patterns -- Record Linkage and Retrieval of Resource Descriptions -- Adaptation to the SDE Model -- Knowledge Base Insertion -- Experiments Using the Enrichment Module -- Client Applications That Integrate SDE Recommendations -- Composer -- AREA -- Evaluation -- Conclusions and Lessons Learned -- References -- Chapter 7: Resources Beyond Content for Open Education -- Open Education for Schools -- Richer Interactions Through Resources Beyond Content -- The Persons and Events Directory -- Technical Implementation -- Federated Access to Learning Resources -- Facetted Search Engine -- Integration with Other iTEC Activities and Learning Tools -- Evaluation -- Potential Benefits of the iTEC Persons and Events Directory -- Find Resources to Improve Your Teaching Practice -- Promote Your Initiatives and Publish Your Resources -- Become a Member and Benefit from Networking -- Technical Feasibility -- Usability Evaluation -- Usage and Social Evaluation -- Other Operational Feasibility -- Challenges and Future Developments -- Web-Search of Educational Resources Beyond Content -- Innovates Approaches to Data Exploration and Collaboration -- Conclusions -- References -- Chapter 8: The iTEC Widget Store -- The Role of Widgets in iTEC -- A Long-Standing Problem of Interoperability -- The Technical Response of the iTEC Project -- The Need for a Widget Store -- Building the Store -- The Discovery Service , The Store Deployed as a Widget -- The REST API -- Widget Store Content Tools -- Managing Widgets -- Discovering Widgets -- Moving Beyond Widgets: IMS LTI Compatibility -- Conclusions -- References -- Chapter 9: The Impact and Potential of iTEC: Evidence from Large-Scale Validation in School Classrooms -- Introduction -- Background -- Evaluation Questions and Approach -- How Did the iTEC Approach Impact on Learners and Learning? -- How Did iTEC Impact on Teachers and Teaching? -- What Is the Potential of the iTEC Approach for System-Wide Adoption in Schools? -- Conclusions -- Lessons Learned -- Recommendations and Implications for Practice -- Policy Making -- Management of Teaching and Learning -- Technology Provision -- Research -- References -- Appendix The iTEC Data Model and Vocabularies -- Information Model Format -- Data Types -- CharacterString -- Number -- Boolean -- DateTime -- Duration -- Language -- LangString -- UriId -- VocabularyTerm -- Person -- Event -- Learning Activity -- Tool in the Widget Store -- Requirement -- Glossary of Terms Used in iTEC
    Additional Edition: Print version Van Assche, Frans Re-Engineering the Uptake of ICT in Schools Cham : Springer International Publishing AG,c2015 ISBN 9783319193656
    Language: English
    Keywords: Electronic books
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [San Rafael] : Morgan & Claypool Publishers
    UID:
    gbv_723616019
    Format: 1 Online-Ressource (107 Seiten)
    Edition: Also available in print
    ISBN: 9781608453405
    Series Statement: Synthesis Lectures on Human Language Technologies #11
    Content: Human language acquisition has been studied for centuries, but using computational modeling for such studies is a relatively recent trend. However, computational approaches to language learning have become increasingly popular, mainly due to advances in developing machine learning techniques, and the availability of vast collections of experimental data on child language learning and child-adult interaction. Many of the existing computational models attempt to study the complex task of learning a language under cognitive plausibility criteria (such as memory and processing limitations that humans face), and to explain the developmental stages observed in children. By simulating the process of child language learning, computational models can show us which linguistic representations are learnable from the input that children have access to, and which mechanisms yield the same patterns of behaviour that children exhibit during this process. In doing so, computational modeling provides insight into the plausible mechanisms involved in human language acquisition, and inspires the development of better language models and techniques. This book provides an overview of the main research questions in the field of human language acquisition. It reviews the most commonly used computational frameworks, methodologies and resources for modeling child language learning, and the evaluation techniques used for assessing these computational models. The book is aimed at cognitive scientists who want to become familiar with the available computational methods for investigating problems related to human language acquisition, as well as computational linguists who are interested in applying their skills to the study of child language acquisition. Different aspects of language learning are discussed in separate chapters, including the acquisition of the individual words, the general regularities which govern word and sentence form, and the associations between form and meaning. For each of these aspects, the challenges of the task are discussed and the relevant empirical findings on children are summarized. Furthermore, the existing computational models that attempt to simulate the task under study are reviewed, and a number of case studies are presented
    Content: 2. Computational models of language learning -- What to expect from a model -- Marr's levels of cognitive modeling -- Cognitive plausibility criteria -- Modeling frameworks -- Symbolic modeling -- Connectionist modeling -- Probabilistic modeling -- Research methods -- Available resources -- Analysis of language production data -- Experimental methods of studying language processing -- Summary --
    Content: 3. Learning words -- Mapping words to meanings -- Child developmental patterns -- Suggested learning mechanisms -- Existing computational models of word learning -- Case study: associating phonological forms with concepts -- Case study: rule-based cross-situational learning -- Case study: probabilistic cross-situational learning -- Integrating other information resources -- Syntactic structure of the sentence -- Social cues -- Summary --
    Content: 4. Putting words together -- Morphology: word form regularities -- Computational models of learning morphology -- Case study: learning English past tense -- Formation of lexical categories -- Computational models of lexical category induction -- Evaluation of the induced categories -- Learning structural knowledge of language -- Nativist accounts of syntax -- Formal studies of learnability -- Case study: models of P & P -- Usage-based accounts of syntax -- Case study: distributional representation of syntactic structure -- Grammar induction from corpora -- Case study: MOSAIC -- Summary --
    Content: 5. Form-meaning associations -- Acquisition of verb argument structure -- Semantic bootstrapping -- Construction grammar -- Computational models of construction learning -- Case study: Chang (2004) -- Semantic roles and grammatical functions -- The nature of semantic roles -- Computational studies of semantic roles -- Case study: Alishahi and Stevenson (2010) -- Selectional preferences of verbs -- Computational models of the induction of selectional preferences -- Summary --
    Content: 6. Final thoughts -- Standard research methods -- Learning problems -- Bibliography -- Author's biography
    Content: Preface -- 1. Overview -- Language modularity -- Language learnability -- Empirical and computational investigation of linguistic hypotheses -- The scope of this book -- Mapping words to meanings -- Learning syntax -- Linking syntax to semantics --
    Note: Description based upon print version of record , Preface; Overview; Language modularity; Language learnability; Empirical and computational investigation of linguistic hypotheses; The scope of this book; Mapping words to meanings; Learning syntax; Linking syntax to semantics; Computational Models of Language Learning; What to expect from a model; Marr's levels of cognitive modeling; Cognitive plausibility criteria; Modeling frameworks; Symbolic modeling; Connectionist modeling; Probabilistic modeling; Research methods; Available resources; Analysis of language production data; Experimental methods of studying language processing; Summary , Learning WordsMapping words to meanings; Child developmental patterns; Suggested learning mechanisms; Existing computational models of word learning; Case study: associating phonological forms with concepts; Case study: rule-based cross-situational learning; Case study: probabilistic cross-situational learning; Integrating other information resources; Syntactic structure of the sentence; Social cues; Summary; Putting Words Together; Morphology: word form regularities; Computational models of learning morphology; Case study: learning English past tense; Formation of lexical categories , Computational models of lexical category inductionEvaluation of the induced categories; Learning structural knowledge of language; Nativist accounts of syntax; Formal studies of learnability; Case study: models of P & P; Usage-based accounts of syntax; Case study: distributional representation of syntactic structure; Grammar induction from corpora; Case study: MOSAIC; Summary; Form-Meaning Associations; Acquisition of verb argument structure; Semantic bootstrapping; Construction grammar; Computational models of construction learning; Case study: Chang (2004) , Semantic roles and grammatical functionsThe nature of semantic roles; Computational studies of semantic roles; Case study: Alishahi and Stevenson (2010); Selectional preferences of verbs; Computational models of the induction of selectional preferences; Summary; Final Thoughts; Standard research methods; Learning problems; Bibliography; Author's Biography; , Also available in print. , System requirements: Adobe Acrobat Reader. , Mode of access: World Wide Web.
    Additional Edition: ISBN 9781608453399
    Additional Edition: Print version Computational Modeling of Human Language Acquisition
    Language: English
    Keywords: Electronic books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages