9,593 research outputs found

    Analytical usability evaluation for digital libraries: A case study

    Get PDF

    Methodological development

    Get PDF
    Book description: Human-Computer Interaction draws on the fields of computer science, psychology, cognitive science, and organisational and social sciences in order to understand how people use and experience interactive technology. Until now, researchers have been forced to return to the individual subjects to learn about research methods and how to adapt them to the particular challenges of HCI. This is the first book to provide a single resource through which a range of commonly used research methods in HCI are introduced. Chapters are authored by internationally leading HCI researchers who use examples from their own work to illustrate how the methods apply in an HCI context. Each chapter also contains key references to help researchers find out more about each method as it has been used in HCI. Topics covered include experimental design, use of eyetracking, qualitative research methods, cognitive modelling, how to develop new methodologies and writing up your research

    S-BPM in the Wild

    Get PDF
    This is the first book to present field studies on the application of subject-oriented business process management (S-BPM). Each case presents a specific story and focuses on an essential modeling or implementation issue, and most end with implications or suggestions for further studies. Significant variables and success factors are identified that were discovered during the respective study and lead to suggesting S-BPM novelties. For each case, the authors explain step-by-step how the story develops, and provide readers guidance by detailing the respective rationale. The studies covered are clustered according to three main S-BPM themes: Part I “Business Operation Support” documents approaches to the practical development of S-BPM solutions in various application domains and organizational settings, while Part II “Consultancy and Education Support” highlights cases that can help to train readers in S-BPM modeling and knowledge acquisition for S-BPM lifecycle iterations. It also refers to architecting S-BPM solutions for application cases based on hands-on experience. Part III “Technical Execution Support” focuses on concepts for utilizing specific theories and technologies to execute S-BPM models. It also addresses how to create reference models for certain settings in the field. Lastly, the appendix covers all relevant aspects needed to grasp S-BPM modeling and apply it based on fundamental examples. Its format reconciles semantic precision with syntactic rigor.>Addressing the needs of developers, educators and practitioners, this book will help companies to learn from the experiences of first-time users and to develop systems that fit their business processes, explaining the latest key methodological and technological S-BPM developments in the fields of training, research and application

    Finding Streams in Knowledge Graphs to Support Fact Checking

    Full text link
    The volume and velocity of information that gets generated online limits current journalistic practices to fact-check claims at the same rate. Computational approaches for fact checking may be the key to help mitigate the risks of massive misinformation spread. Such approaches can be designed to not only be scalable and effective at assessing veracity of dubious claims, but also to boost a human fact checker's productivity by surfacing relevant facts and patterns to aid their analysis. To this end, we present a novel, unsupervised network-flow based approach to determine the truthfulness of a statement of fact expressed in the form of a (subject, predicate, object) triple. We view a knowledge graph of background information about real-world entities as a flow network, and knowledge as a fluid, abstract commodity. We show that computational fact checking of such a triple then amounts to finding a "knowledge stream" that emanates from the subject node and flows toward the object node through paths connecting them. Evaluation on a range of real-world and hand-crafted datasets of facts related to entertainment, business, sports, geography and more reveals that this network-flow model can be very effective in discerning true statements from false ones, outperforming existing algorithms on many test cases. Moreover, the model is expressive in its ability to automatically discover several useful path patterns and surface relevant facts that may help a human fact checker corroborate or refute a claim.Comment: Extended version of the paper in proceedings of ICDM 201

    Clitics in the wild

    Get PDF
    This collective monograph is the first data-oriented, empirical in-depth study of the system of clitics on Bosnian, Croatian and Serbian. It fills the gap between the theoretical and normative literature by including solid data on variation found in dialects and spoken language and obtained from massive Web Corpora and speakers’ acceptability judgements. The authors investigate three primary sources of variation: inventory, placement and morphonological processes. A separate part of the book is dedicated to the phenomenon of clitic climbing, the major challenge for any syntactic theory. The theory of complexity serves as the explanation for the very diverse constraints on clitic climbing established in the empirical studies. It allows to construct a series of hierarchies where the factors relevant for predicting clitic climbing interact with each other. Thus, the study pushes our understanding of clitics away from fine-grained descriptions and syntactic generalisations towards a probabilistic modelling of syntax

    Pioneers in the Wild West: Managing Data Collections

    Get PDF
    During the last few years, many academic libraries have accepted the challenge of helping their users locate and acquire the numeric data they need. To meet their users’ ever-increasing need for data, librarians are purchasing data sets one at a time (“small data”). This service, though important to our users, raises many issues in the areas of collection scope, acquisition procedures, and discovery and access. The authors conducted a survey of data librarians in summer 2015 and followed up by interviewing five data librarians in depth to report on how academic libraries collect and manage small data and to explore the strengths and weaknesses of various approaches
    • 

    corecore