Filters








593,724 Hits in 7.0 sec

A framework for the delivery of personalized adaptive content

Com Howlin, Danny Lynch
2014 2014 International Conference on Web and Open Access to Learning (ICWOAL)  
The curriculum is used to drive the direction of the personalized learning path, while the content is responsible for the delivery and presentation of the concepts to be learned.  ...  Increasingly institutions are turning to adaptive platforms to deliver these online courses as they seek to offer personalized learning to each individual.  ...  INTRODUCTION The number of students taking online courses has grown dramatically in recent years.  ... 
doi:10.1109/icwoal.2014.7009203 fatcat:avpd7yzcdrbmlo266mfvgfxiae

Ephemeral and Persistent Personalization in Adaptive Information Access to Scholarly Publications on the Web [chapter]

Stefano Mizzaro, Carlo Tasso
2002 Lecture Notes in Computer Science  
We show how personalization techniques can be exploited to implement more adaptive and effective information access systems in electronic publishing.  ...  a specialized Web portal, by physicists in their daily job.  ...  Introduction Oversupply of information constitutes a well known phenomenon that is progressively becoming worse and that threatens Web usefulness.  ... 
doi:10.1007/3-540-47952-x_32 fatcat:3zczf6vpzjcl7lwfx5fwz3bxwe

Introduction

John H. Stone
1998 Technology and Disability  
In Making Multimedia Accessible on the World Wide Web, Larry Goldman and Geoff Freed describe in detail the technologies being developed in the Web Access Project of the National Center for Accessible  ...  Introduction Assistive Technology enables persons with disabilities to perform many types of activities, many of them related to Activities of Daily Living, such as bathing, eating and dressing, or Instrumental  ... 
doi:10.3233/tad-1998-8301 fatcat:y3od555z25chvgpswveyybxevy

Introduction [chapter]

Malcolm Harkins
2013 Managing Risk and Information Security  
Introduction There are two primary choices in life: to accept conditions as they exist, or accept the responsibility for changing them.  ...  For example, unscrupulous individuals may tap into the network to access web sites for purposes such as illegally downloading music or pornography.  ... 
doi:10.1007/978-1-4302-5114-9_1 fatcat:xvwvtsv63vc3xa4ln3dezekb5m

Introduction [chapter]

Malcolm W. Harkins
2016 Managing Risk and Information Security  
access to Europeans' personal data stored in the US (Scott 2016).  ...  Introduction There are two primary choices in life: to accept conditions as they exist, or accept the responsibility for changing them .  ... 
doi:10.1007/978-1-4842-1455-8_1 fatcat:znl7fv5aubdjxcf5lajxykjtiq

Introduction [chapter]

Tanya Kant
2020 Making it Personal  
The introduction provides an overview of current debates and problems associated with the intervention of personalization algorithms into web users' everyday life.  ...  and web personalization.  ...  the fact that if they want access to the services they use on a daily basis, then they must sacrifice their data to do so (Turow et al., 2015) .  ... 
doi:10.1093/oso/9780190905088.003.0001 fatcat:sggpkwrqzvg6vde3fvlephlpbq

Introduction

Jenny Davis, Nathan Jurgenson
2015 Interface A special topics journal  
To theorize the Web is to theorize the self, society, and the world.  ...  We began Theorizing the Web in 2011 to advance a different kind of conversation-one that highlights novel ways of thinking about the Web that are conceptual, sharp, historical, and critical, yet also accessible  ...  Although each piece maintains a unique empirical and theoretical focus, the thread that holds the issue together is the authors' careful consideration of the digital as necessarily tied to the physical  ... 
doi:10.7710/2373-4914.1001 fatcat:hcbm7j2mmzceld3z3y4qs4bwg4

Introduction [chapter]

Nilanjan Dey, Gitanjali Shinde, Parikshit Mahalle, Henning Olesen
2019 The Internet of Everything  
To create a niche for nonliving things to react, respond and work autonomously as and when required and as per their role, position and location in the ecosystem to provide services to the user, IoT is  ...  Nowadays, the vision of IoT has expanded to connect everything from industrial equipment, to everyday objects, to living organisms such as plants, farm animals and people.  ...  Objective of the book In the era before IoT, the World Wide Web, Internet, Web 2.0 and social media made people's lives comfortable by providing web services and facility to access personal data irrespective  ... 
doi:10.1515/9783110628517-001 fatcat:ckmxfh4xubgdza2tbxyoehyqxq

Introduction

D. Lynne Madden, Carlie-Jane Naylor
2009 NSW Public Health Bulletin  
This study provided a snapshot of the current use of six communication techniques by a small sample of the population health workforce in NSW.  ...  Introduction D.  ...  The public health workforce in NSW value access to Bug Breakfast and in particular the 'live' delivery, which provides access to experts.  ... 
doi:10.1071/nb09s20 fatcat:gbumbelmbjfelckruj6pils3dq

Introduction [chapter]

2013 Internet Applications of Type II Uses of Technology in Education  
in Education has been co-published simultaneously as Computers in the Schools, Volume 22, Numbers 1/2 2005.  ...  Since access to the Internet and the Web is integral in making WebQuests a success, any difficulty accessing the Web would make the lesson impossible to complete.  ...  INTRODUCTION Type II Applications of Technology in Education: New and Better Ways of Teaching and Learning INTRODUCTION Cleborne D. Maddux D.  ... 
doi:10.4324/9780203050576-4 fatcat:3e3jjjn73namtjlabbcpivepti

Introduction

Paul Horn, Frances West
2005 IBM Systems Journal  
Beyond mere access to a system, can the user have an experience comparable to a person without a disability? Can he or she access needed information as quickly, as effortlessly, and as enjoyably?  ...  Tier 2 reflects awareness about the experience that a system offers to a person with disabilities.  ... 
doi:10.1147/sj.2005.5386685 fatcat:zq2utxojsjem3ay7ecihrftplm

Introduction [chapter]

Krisztian Balog
2018 Advanced Topics in Information Retrieval  
We use Google (Bing, Yandex, Baidu, etc.) as the main gateway to find information on the Web.  ...  We have grown accustomed to expect a search box somewhere near the top of the screen, and we have also increased our expectations of the quality and speed of the responses to our searches.  ...  Introduction .2 A Brief Historical Outlook Introduction Introduction Introduction Introduction  ... 
doi:10.1007/978-3-319-93935-3_1 fatcat:d7pyoekwqjenbba5bagxgmxkee

Introduction [chapter]

Roxana Radu
2019 Negotiating Internet Governance  
Based on extensive empirical analysis covering more than four decades, it presents the evolution of Internet regulation from the early days of networking to more recent debates on algorithms and artificial  ...  It discusses the objectives of the book, as well as the conceptual and empirical approach applied for reaching them.  ...  it is assumed to be several times bigger than the searchable web. 4 This hidden side of the World Wide Web is not covered by regular search engines, and access to it generally requires the use of circumvention  ... 
doi:10.1093/oso/9780198833079.003.0001 fatcat:dnkwxwg475dkxonrwhpdbdnrwi

Introduction

Yaşar Tonta, Gail Hodge
2005 Information Services and Use  
the Semantic Web.  ...  He reviews the developments in information technologies that are giving way to customization and personalization of electronic information services. Dr.  ... 
doi:10.3233/isu-2005-25101 fatcat:xueuqvuxsredxime5fhagllu7u
« Previous Showing results 1 — 15 out of 593,724 results