Cambridge Journals Online (CJO) is the e-publishing service for over 230 journals published by Cambridge University Press and is entirely developed and hosted in-house. The platform's powerful capacity and reliable performance are maintained by a combination of our own expertise and a process of consultation with the library and research communities. With the help of these stakeholders, we maintain CJO as an industry-leading e-publishing service.
Classical knowledge representation methods traditionally work with established relations such as synonymy, hierarchy and unspecified associations. Recent developments like
ontologies and folksonomies show new forms of collaboration, indexing and knowledge representation and encourage the reconsideration of standard knowledge relationships. In a
summarizing overview we show which relations are currently utilized in elaborated knowledge representation methods and which may be inherently hidden in folksonomies and ontologies.
This paper presents a work in progress whose
purpose is to model the handled, acquired, correct and
erroneous knowledge of individual learners engaged in
learning activities through virtual learning environments.
This knowledge is represented according to a cognitivecomputational
model which also serves to represent the
domain knowledge via an authoring tool. The latter
generates structures that allow the tutor to provide an
effective feedback to improve significantly the cognitive
level of the learner.
J. Frey, and S. Hellmann. 13th International Conference on Semantic Systems Proceedings (SEMANTiCS 2017) - Posters & Demonstrations Track, (September 2017)
D. Schlör, J. Pfister, and A. Hotho. 2023 the 7th International Conference on Medical and Health Informatics (ICMHI), page 136–141. New York, NY, USA, Association for Computing Machinery, (2023)
S. Straka, M. Koch, A. Carolus, M. Latoschik, and C. Wienrich. Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, New York, NY, USA, Association for Computing Machinery, (2023)
A. Dockhorn. IEEE Computational Intelligence Magazine, 17 (4):
52-53(November 2022)This is an immersive article. Therefore, extended interactive ressources are provided at the publisher webpage. A pre-print can be found at: https://aiexplained.github.io/.
Q. Le, and T. Mikolov. Proceedings of the 31st International Conference on Machine Learning, volume 32 of Proceedings of Machine Learning Research, page 1188--1196. Bejing, China, PMLR, (June 2014)
M. Ryabinin, S. Popov, L. Prokhorenkova, and E. Voita. Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP), page 7317--7331. Online, Association for Computational Linguistics, (November 2020)
Z. Zhang, X. Han, Z. Liu, X. Jiang, M. Sun, and Q. Liu. Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics, page 1441--1451. Florence, Italy, Association for Computational Linguistics, (July 2019)
Y. Liang, S. Ke, J. Zhang, X. Yi, and Y. Zheng. Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, International Joint Conferences on Artificial Intelligence Organization, (July 2018)
J. Frey, and S. Hellmann. 13th International Conference on Semantic Systems Proceedings (SEMANTiCS 2017) - Posters & Demonstrations Track, (September 2017)
S. Ainsworth, M. Nelson, and H. de Sompel. Proceedings of the 26th ACM Conference on Hypertext & Social Media - HT \textquotesingle15, ACM Press, (2015)
Z. Zhang, X. Han, Z. Liu, X. Jiang, M. Sun, and Q. Liu. Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics, page 1441--1451. Florence, Italy, Association for Computational Linguistics, (July 2019)
A. Paivio. Draft chapter presented at the conference on Pathways to Literacy Achievement for High Poverty Children at The University of Michigan School of Education, (2006)
Gayrat, and Avazjon. IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue III):
38-42(March 2019)1 Federal Agency on Technical Regulation and Metrology: Block ciphers (2015). http://www.tc26.ru/en/standard/draft/ENG_GOST_R_bsh.pdf. 2 Information technology. Cryptographic data security. Block ciphers operation modes. URL: http://www.tc26.ru/standard/ gost/GOST_R_ 3413-2015.pdf. 3 E. Biham, A. Shamir. Differential cryptanalysis of DES-like cryptosystems // Journal Cryptology. 1991. V. 4. P. 3–72. 4 R. AlTawy, A. Youssef, Meet in the Middle Attack on Reduced Round Kuznyechik, https://eprint.iacr.org/2015/ 096.pdf, pp. 9-12. 5 A. Biryukov, L. Perrin, A. Udovenko, Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1 (Full Version), https://eprint.iacr.org/ 2016/071.pdf, p. 3. 6 V. Dolmatov, GOST R 34.12-2015: Block Cipher "Kuznyechik. http://www.protocols.ru/WP/wp-content/ uploads/2016 /03/ rfc7801.pdf, pp. 3-4. 7 G.U. Juraev, A.A. Ikramov, A.R. Marakhimov, About differential cryptanalysis algorithm of block encryption Kuznyechik //International Journal of Advanced Research in Science, Engineering and Technology. Vol. 6, Issue 2, Feb 2019. –P. 8164-8169. http://www.ijarset.com/upload/2019/february/26-IJARSET-gjuraev.pdf..
K. Zhao, Y. Li, Z. Shuai, and C. Yang. Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery &\#38; Data Mining, page 1031--1039. New York, NY, USA, ACM, (2018)
S. Pilloud, and C. Bovet. Histoire, médecine et santé, (hiver 2017 2018)Évolution des discours et pratiques liés à la prise en charge de la vieillesse (canton de Vaud, xixe-xxie siècles).
J. Turian, L. Ratinov, and Y. Bengio. Proceedings of the 48th annual meeting of the association for computational linguistics, page 384--394. Association for Computational Linguistics, (2010)