Author of the publication

Personal Learning Environments: Challenging the dominant design of educational systems

, , , , , and . Proceedings of the first Joint International Workshop on Professional Learning, Competence Development and Knowledge Management - LOKMOL and L3NCD, (2006)
DOI: 10.1.1.107.3816

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Philosophy in the flesh: the embodied mind and its challenge to Western thought, and . Basic Books, (1998)Improving unsupervised dependency parsing with richer contexts and smoothing, , and . Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics, page 101--109. Stroudsburg, PA, USA, Association for Computational Linguistics, (2009)The AMS Operating System: a prototyping environment for real-time signal processing algorithm development., and . RSP, page 182-186. IEEE Computer Society, (1995)Using Molecular Equivalence Numbers To Visually Explore Structural Features that Distinguish Chemical Libraries., and . Journal of Chemical Information and Computer Sciences, 42 (4): 912-926 (2002)Algorithm for Naming Molecular Equivalence Classes Represented by Labeled Pseudographs., and . Journal of Chemical Information and Computer Sciences, 41 (1): 181-185 (2001)Chemotypic Coverage: A New Basis for Constructing Screening Sublibraries., , , , and . Journal of Chemical Information and Modeling, 49 (3): 531-542 (2009)Disfluency Detection using a Noisy Channel Model and a Deep Neural Language Model., and . CoRR, (2018)The DOP Estimation Method Is Biased and Inconsistent.. Computational Linguistics, 28 (1): 71-76 (2002)nocaps: novel object captioning at scale., , , , , , , , , and . CoRR, (2018)Dither-based secure image hashing using distributed coding., and . ICIP (2), page 751-754. IEEE, (2003)