Author of the publication

Learner-Generated Annotation of Learning Resources - Lessons from Experiments on Tagging

, , , and . International Conference on Knowledge Management (I-KNOW 08), Graz, Austria, September 2008, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptation Criteria for Preparing Learning Material for Adaptive Usage: Structured Content Analysis of Existing Systems.. USAB, volume 5298 of Lecture Notes in Computer Science, page 411-418. Springer, (2008)Protecting Knowledge in the Financial Sector: An Analysis of Knowledge Risks Arising from Social Media., , and . HICSS, page 4031-4040. IEEE Computer Society, (2016)The Ends of Knowledge Sharing in Networks: Using Information Technology to Start Knowledge Protection., , and . ECIS, (2015)Analytics for Everyday Learning from two Perspectives: Knowledge Workers and Teachers., , , , , and . AFEL@EC-TEL, volume 2209 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)Reflections on the Workshop., and . AFEL@EC-TEL, volume 2209 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)Improving Search Strategies of Auditors - A Focus Group on Reflection Interventions., , , and . ARTEL@EC-TEL, volume 1997 of CEUR Workshop Proceedings, CEUR-WS.org, (2017)Knowledge Risks in Digital Supply Chains: A Literature Review., and . Wirtschaftsinformatik (Zentrale Tracks), page 370-385. GITO Verlag, (2020)Enhanced Active Learning of Convolutional Neural Networks: A Case Study for Defect Classification in the Semiconductor Industry., , , , , and . KDIR, page 269-276. SCITEPRESS, (2020)Knowledge Analytics For Workplace Learning., , and . LWDA, volume 1670 of CEUR Workshop Proceedings, page 103-110. CEUR-WS.org, (2016)Challenges in Cross-Organizational Security Management., , , and . HICSS, page 5480-5489. IEEE Computer Society, (2012)