A Comparison of Two Navigational Aids for Hypertext Mark Alan Satterfield Iowa State University
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Rdfa in XHTML: Syntax and Processing Rdfa in XHTML: Syntax and Processing
RDFa in XHTML: Syntax and Processing RDFa in XHTML: Syntax and Processing RDFa in XHTML: Syntax and Processing A collection of attributes and processing rules for extending XHTML to support RDF W3C Recommendation 14 October 2008 This version: http://www.w3.org/TR/2008/REC-rdfa-syntax-20081014 Latest version: http://www.w3.org/TR/rdfa-syntax Previous version: http://www.w3.org/TR/2008/PR-rdfa-syntax-20080904 Diff from previous version: rdfa-syntax-diff.html Editors: Ben Adida, Creative Commons [email protected] Mark Birbeck, webBackplane [email protected] Shane McCarron, Applied Testing and Technology, Inc. [email protected] Steven Pemberton, CWI Please refer to the errata for this document, which may include some normative corrections. This document is also available in these non-normative formats: PostScript version, PDF version, ZIP archive, and Gzip’d TAR archive. The English version of this specification is the only normative version. Non-normative translations may also be available. Copyright © 2007-2008 W3C® (MIT, ERCIM, Keio), All Rights Reserved. W3C liability, trademark and document use rules apply. Abstract The current Web is primarily made up of an enormous number of documents that have been created using HTML. These documents contain significant amounts of structured data, which is largely unavailable to tools and applications. When publishers can express this data more completely, and when tools can read it, a new world of user functionality becomes available, letting users transfer structured data between applications and web sites, and allowing browsing applications to improve the user experience: an event on a web page can be directly imported - 1 - How to Read this Document RDFa in XHTML: Syntax and Processing into a user’s desktop calendar; a license on a document can be detected so that users can be informed of their rights automatically; a photo’s creator, camera setting information, resolution, location and topic can be published as easily as the original photo itself, enabling structured search and sharing. -
The Web 2.0 Way of Learning with Technologies Herwig Rollett
Int. J. Learning Technology, Vol. X, No. Y, xxxx 1 The Web 2.0 way of learning with technologies Herwig Rollett* Know-Center, Inffeldgasse 21a A-8010 Graz, Austria E-mail: [email protected] *Corresponding author Mathias Lux Department for Information Technology University of Klagenfurt Universitätsstraße 65–67 A-9020 Klagenfurt, Austria E-mail: [email protected] Markus Strohmaier Department of Computer Science University of Toronto 40 St. George Street Toronto, Ontario M5S 2E4, Canada Know-Center, Inffeldgasse 21a A-8010 Graz, Austria E-mail: [email protected] Gisela Dösinger Know-Center, Inffeldgasse 21a A-8010 Graz, Austria E-mail: [email protected] Klaus Tochtermann Know-Center Institute of Knowledge Management Graz University of Technology Inffeldgasse 21a, A-8010 Graz, Austria E-mail: [email protected] Copyright © 200x Inderscience Enterprises Ltd. 2 H. Rollett et al. Abstract: While there is a lot of hype around various concepts associated with the term Web 2.0 in industry, little academic research has so far been conducted on the implications of this new approach for the domain of education. Much of what goes by the name of Web 2.0 can, in fact, be regarded as a new kind of learning technologies, and can be utilised as such. This paper explains the background of Web 2.0, investigates the implications for knowledge transfer in general, and then discusses its particular use in eLearning contexts with the help of short scenarios. The main challenge in the future will be to maintain essential Web 2.0 attributes, such as trust, openness, voluntariness and self-organisation, when applying Web 2.0 tools in institutional contexts. -
Hypertext Newswriting Effects on Satisfaction, Comprehension and Attitudes João Canavilhas Universidade Da Beira Interior Key-W
Hypertext newswriting effects on satisfaction, comprehension and attitudes João Canavilhas Universidade da Beira Interior Key-words: hypertext; web journalism; online jornalism Abstract More than a decade after the beginning of online journalism, the great expectations of this field of expertise remain unfulfilled. Hypertextuality, multimediality, and interactivity remain original marks as yet unexplored by journalism made on the web (though not for the web). In the specific case of hypertextuality, the subject of this study, its little use is linked with journalists’ time constraints, the absence of an organizational model not limited to copying printed papers, and the fear that readers may reject non-linear reading (Paul, 2005). The latter reason is likely what is most hindering the evolution of web journalism, despite the great potential of online news formed by networks of linked texts. To begin with, it frees the reader, giving them the option to create their own path of reading. Additionally, it offers extra contextual information about the subject, allowing readers to increase their knowledge on the subject according to their own interests. Despite the apparent advantages, such textual networks demand an additional effort of readers to interact with the theme. They must follow links, and skip from text to text, which may be perceived as obstructive to their reading. The passivity imposed by the most powerful medium, television, and the recipients’ deeply-rooted habit of linear readings raise an important question: Will readers value the hypertext contexts to such an extent that they will make that additional effort, or are the newspapers right in their fears of the readers’s reaction? In an attempt to answer this question, an experimental study was carried out assessing the effects of hypertext on levels satisfaction, perception, comprehension, and attitudes 1 of online news readers. -
An Analysis of Dewey Linked Data
Palabra Clave (La Plata) ISSN: 1853-9912 [email protected] Universidad Nacional de La Plata Argentina Classification on the Web: an analysis of Dewey Linked Data Tomoyose, Kazumi; Simionato Arakaki, Ana Carolina Classification on the Web: an analysis of Dewey Linked Data Palabra Clave (La Plata), vol. 9, núm. 2, 2020 Universidad Nacional de La Plata, Argentina Disponible en: http://www.redalyc.org/articulo.oa?id=350562513005 DOI: https://doi.org/10.24215/18539912e092 PDF generado a partir de XML-JATS4R por Redalyc Proyecto académico sin fines de lucro, desarrollado bajo la iniciativa de acceso abierto Palabra Clave (La Plata), 2020, 9(2), Abril-Septiembre, ISSN: 1853-9912 Avances de investigación Classification on the Web: an analysis of Dewey Linked Data La Clasificación en la web: un análisis de Dewey Linked Data Kazumi Tomoyose DOI: https://doi.org/10.24215/18539912e092 Universidade Federal de São Carlos, Brasil Redalyc: http://www.redalyc.org/articulo.oa? [email protected] id=350562513005 Ana Carolina Simionato Arakaki Universidade Federal de São Carlos, Brasil [email protected] Recepción: 23 Agosto 2019 Aprobación: 12 Noviembre 2019 Abstract: With the availability of information in the World Wide Web its access and retrieval by the users is facilitated, and the Library and Information Science (LIS) field’s knowledge and techniques can be applied to this environment in order to help with the process. e present study is descriptive, qualitative and exploratory, based on bibliographical sources, in which it was explored how the Classification discipline interacts with Linked Data, focusing on the analysis of Dewey Linked Data. -
XHTML Rdfa Modules XHTML Rdfa Modules
XHTML RDFa Modules XHTML RDFa Modules XHTML RDFa Modules Modules to support RDF annotation of elements W3C Editor’s Draft 11 August 2007 This version: http://www.w3.org/MarkUp/2007/ED-xhtml-rdfa-20070811 Latest version: http://www.w3.org/TR/xhtml-rdfa Previous Editor’s Draft: http://www.w3.org/MarkUp/2007/ED-xhtml-rdfa-20070705 Diff from previous Editor’s Draft: xhtml-rdfa-diff.html Editors: Mark Birbeck, x-port.net Ltd. Shane McCarron, Applied Testing and Technology, Inc. This document is also available in these non-normative formats: PostScript version, PDF version, ZIP archive, and Gzip’d TAR archive. The English version of this specification is the only normative version. Non-normative translations may also be available. Copyright © 2007 W3C® (MIT, ERCIM, Keio), All Rights Reserved. W3C liability, trademark and document use rules apply. Abstract The XHTML RDFa (RDF using attributes) modules define a collection of elements and attributes that enhance a document authors ability to annotate the relationships of content within and among documents. These modules can be integrated into any markup language based upon XHTML Modularization [XHTMLMOD [p.45] ]. Status of This Document This section describes the status of this document at the time of its publication. Other documents may supersede this document. A list of current W3C publications and the latest revision of this technical report can be found in the W3C technical reports index at http://www.w3.org/TR/. - 1 - Table of Contents XHTML RDFa Modules This document is an internal editors draft for development purposes. However, its content is based upon mature materials from [XHTML2 [p.45] ] and is therefore considered nearly complete. -
An Overview of Hypertext Transfer Protocol Service Security on Business Domain
2012 International Conference on Management and Education Innovation IPEDR vol.37 (2012) © (2012) IACSIT Press, Singapore An Overview of Hypertext Transfer Protocol service Security on Business Domain + Burra Venkata Durga Kumar Taylor’s Business School, Taylor’s University-Malaysia Abstract. Network protocols define the way data is transported between computers in a networked environment. Network protocols completely hide business functionality from higher level services and protocols, which can simply assume that, by providing the assigned name of another computer and company can transit a message or open a continuous communication stream without dealing with the intricacies of data transport. Populates Internet began to grow rapidly like expands with new tools, that is the new standard Hypertext Transfer Protocol and Hypertext Markup Language were introduced to the public. Hypertext Transfer Protocol to make accessing information through the Transfer Control Protocol or Internet Protocol is easier than ever. Hypertext Markup Language allows people to present information that is visually more interesting. Appearance of Hypertext Transfer Protocol and Hypertext Markup Language made people knows so popular, that is often considered synonymous with the Internet itself to the World Wide Web. The purpose of this paper is that knowing what kinds of security methods are appropriate for this Hypertext Transfer Protocol service and then explanations on World Wide Web and Hypertext Transfer Protocol works mechanisms. Proving the security methods of the answers obtained from what are assumed from the issues and included all models. Keywords: Network Protocols, Hypertext Transfer Protocol, Hypertext Markup Language, Transfer Control Protocol, Security, Business. 1. Introduction Nowadays, Internet service become very widely in business purpose and functionality, and for two popular internet services that common used by people, such as FTP (File Transfer Protocol) and HTTP (Hypertext Transfer Protocol). -
Web 2.0: Hypertext by Any Other Name?
Web 2.0: Hypertext by Any Other Name? David E. Millard and Martin Ross Electronics and Computer Science University of Southampton Southampton, UK +44 (0) 23 8059 3255 {dem, mar302}@ecs.soton.ac.uk ABSTRACT be the inventor of hypertext, and ever since his original work Web 2.0 is the popular name of a new generation of Web others have been refining his approach, both in terms of what applications, sites and companies that emphasis openness, hypertext should offer, how it is interpreted by readers, and also community and interaction. Examples include technologies such in concrete systems and studies. as Blogs and Wikis, and sites such as Flickr. In this paper we Walker has noted that the new generation of Web applications compare these next generation tools to the aspirations of the has created a new form of feral hypertext, unrestrained by early Hypertext pioneers to see if their aims have finally been systems or ownership [22]. In this paper we analyse the field of realized. hypertext research in order to draw out the aspirations of its pioneers and their subsequent refinements by the community, we Categories and Subject Descriptors then compare these aspirations with a number of Web 2.0 H.5.4 [ Hypertext/Hypermedia ]: Theory systems in order to draw conclusions about how well those earlier ideas have been realised in the modern Web. General Terms Design, Theory 2. ASPIRATIONS In 1987, Halasz took the aspirations of the earlier pioneers and, based on the systems around at the time, described seven issues Keywords that had to be considered and resolved in order to progress Web 2.0, Hypertext Pioneers, Hypertext Functionality towards the systems envisioned; these included composite structures, versioning, collaboration and search [12]. -
Maps and Their Place in Mesopotamia, Egypt, Greece, and Rome
bibliography Adam, J.-P. 1994. Roman Building: Materials ———. 2005. Les routes de la navigation antique: and Techniques. Translated by A. Mathews. Itinéraires en Méditerranée. Paris: Errance. London: Batsford. ———. 2007. “Diocletian’s Prices Edict: The Aillagon, J.-J., ed. 2008. Rome and the Barbar- Prices of Seaborne Transport and the Average ians: The Birth of a New World. Milan: Skira. Duration of Maritime Travel.” Journal of Ro- Alföldy, G. 2000. Provincia Hispania Superior. man Archaeology 20:321– 36. Schriften der Philosophisch- historischen ———. 2007– 8. “Texte et carte de Marcus Klasse der Heidelberger Akademie der Agrippa: Historiographie et données tex- Wissenschaften 19. Heidelberg: Winter. tuelles.” Geographia Antiqua 16– 17:73– 126. al- Jadir, W. 1987. “Une bibliothèque et ses Arnaud- Lindet, M.-P., ed. and trans. 1993. Aide- tablettes.” Archèologia (Dijon) 224:18– 27. mémoire (Liber memorialis). By L. Ampelius. al- Karaji. 1940. Inbat al- miyah al- khafi yya. Paris: Les Belles Lettres. Hyderabad: Da’irat al- ma’arif al- ’uthmaniya. ———, ed. and trans. 1994. Abrégé des hauts faits Reprinted in F. Sezgin et al., eds., Water- du peuple romain. By Festus. Paris: Les Belles Lifting Devices in the Islamic World: Texts Lettres. and Studies, 302– 98 (Frankfurt: Institute Ashby, T. 1935. The Aqueducts of Ancient Rome. for the History of Arabic- Islamic Science, Oxford: Oxford University Press. 2001). Ashmore, W., and A. B. Knapp, eds. 1999. Andreu, G., and C. Barbotin, eds. 2002. Les Archaeologies of Landscape: Contemporary Per- artistes de Pharaon: Deir el- Médineh et la spectives. Malden, MA: Blackwell Publishers. Vallée des Rois. Turnhout: Brepols. Baines, J. 1987. Fecundity Figures. -
Urls Hypertext
Universal Resource Locator (URL) Mendel Rosenblum CS142 Lecture Notes - URLs Hypertext ● Text with links to other text ○ Click on links takes you somewhere else ○ Old idea: ■ Ted Nelson coined the term (early '60s), built Xanadu system ■ Doug Englebart: "Mother of all demos" in 1968 ■ HyperCard for the Macintosh: 1987 ● Web adapted the idea, link specification: ○ Uniform Resource Locators (URL) - Provided names for web content <a href="https://en.wikipedia.org/wiki/URL">URL</a> CS142 Lecture Notes - URLs Parts of an URL http://host.company.com:80/a/b/c.html?user=Alice&year=2008#p2 Scheme (http:): identifies protocol used to fetch the content. Host name (//host.company.com): name of a machine to connect to. Server's port number (80): allows multiple servers to run on the same machine. Hierarchical portion (/a/b/c.html): used by server to find content. Query parameters (?user=Alice&year=2008): provides additional parameters Fragment (#p2): Have browser scroll page to fragment (html: p2 is anchor tag) Used on the browser only; not sent to the server. CS142 Lecture Notes - URLs URL: schemes (e.g. http) http: is the most common scheme; it means use the HTTP protocol https: is similar to http: except that it uses SSL encryption file: means read a file from the local disk mailto: means open an email program composing a message There are several other schemes, such as ftp:, but they aren't used much anymore. CS142 Lecture Notes - URLs URL: Hierarchical portion (/a/b/c.html) ● Passed to the web server for interpretation. Early web servers: ○ Path name for a static HTML file. -
How Spatial Is Hyperspace? Interacting with Hypertext Documents: Cognitive Processes and Concepts
CYBERPSYCHOLOGY & BEHAVIOR Volume 4, Number 1, 2001 Mary Ann Liebert, Inc. How Spatial Is Hyperspace? Interacting with Hypertext Documents: Cognitive Processes and Concepts PATRICIA M. BOECHLER ABSTRACT The World Wide Web provides us with a widely accessible technology, fast access to massive amounts of information and services, and the opportunity for personal interaction with nu- merous individuals simultaneously. Underlying and influencing all of these activities is our basic conceptualization of this new environment; an environment we can view as having a cognitive component (hyperspace) and a social component (cyberspace). This review argues that cognitive psychologists have a key role to play in the identification and analysis of how the processes of the mind interact with the Web. The body of literature on cognitive processes provides us with knowledge about spatial perceptions, strategies for navigation in space, memory functions and limitations, and the formation of mental representations of environ- ments. Researchers of human cognition can offer established methodologies and conceptual frameworks toward investigation of the cognitions involved in the use of electronic envi- ronments like the Web. INTRODUCTION only a new cognitive environment (“hyper- space”) where information is perceived, stored, OR CENTURIES, TEXT-BASED LITERATURE has manipulated, and retrieved in new ways, but Fbeen the primary mode for disseminating also a new social environment (“cyberspace”), and receiving information. The cognitive where one individual’s cognitions about this processes involved in reading and writing new environment interact with those of other books have been studied extensively for people who share it. Unlike physical space, the decades as they have played a crucial role in World Wide Web is not constrained by dis- the development of humankind. -
Visualization Complex Cognitive Networks
2012 3rd International Conference on e-Education, e-Business, e-Management and e-Learning IPEDR vol.27 (2012) © (2012) IACSIT Press, Singapore Visualization Complex Cognitive Networks + MENG Shimin 1 1 DNAgent Lab @Youlinkme.net Co., Ltd. Wuyishan, Fujian China Abstract. Cognitive flow is the important applications of information flow, workflow, social flow after, but need to break through the difficulties in cognitive mapping and materialized. Use visualization techniques to build a simulation platform to realize cognitive schema, cognitive map, flow and other visual cognitive projection, make the invisible visible understanding, building cognitive materialized, visualization mode. Base visualize digital network technology innovation Visualization Complex Cognitive Networks (VCCN) platform, achieve "symbol, mathematical, process" visual computing architecture, and the formation of cognitive visual paradigm. Base VCCN research in human-computer system needs to establish the cognitive interface to build field of cognitive, modulation of cognitive coupled states, through the acquisition of Cognitive Symbol Sequence(CSS), and cognitive activity is mapped to VCCN. It is framed for cognitive nodes, relation, chain, flow, maps, schema, and achieved cognitive object editing, storage, switching, routing, navigation, evaluation, and cognitive flow coupling, excitation, propagation, and be the cognitive visual, functional simulation, power system studies provide new ideas, new paradigm of brain information. VCCN similar negatives shot to the brain cognitive activity with CSS, for the reconstruction of cognitive activity to provide a method. Keywords: complex networks, cognitive visualization, cognitive schema, cognitive map, cognitive symbol sequence, cognitive coupling. 1. Cognitive Flow The brain is a material, energy and information dissipation structure, brain research is to use instruments to stimulation, probe, scan of the brain material, energy, information process, and shooting, collecting data, use the data to understand brain. -
On Using JSON-LD to Create Evolvable Restful Services
On Using JSON-LD to Create Evolvable RESTful Services Markus Lanthaler 1, 2 Christian Gütl 1, 2 1 Institute for Information Systems and Computer Media 2 School of Information Systems Graz University of Technology Curtin University of Technology Graz, Austria Perth, Australia [email protected] [email protected] ABSTRACT being solved, issues on how to integrate these hugely hetero- As the amount of data and devices on the Web experiences geneous datasets into a scalable system become increasingly exponential growth issues on how to integrate such hugely important. Reusing the Web’s underlying architectural style, i.e., heterogeneous components into a scalable system become increa- REST [1], has proven to be a viable solution to transform islands singly important. REST has proven to be a viable solution for of data into an integrated Web of Data. It provides a set of archi- such large-scale information systems. It provides a set of archi- tectural constraints that, when applied as a whole, result in a tectural constraints that, when applied as a whole, result in bene- concrete system architecture that “emphasizes scalability of com- fits in terms of loose coupling, maintainability, evolvability, and ponent interactions, generality of interfaces, independent scalability. Unfortunately, some of REST’s constraints such as the deployment of components, and intermediary components to ones that demand self-descriptive messages or require the use of reduce interaction latency, enforce security, and encapsulate hypermedia as the engine of application state are rarely imple- legacy systems” [1]. mented correctly. This results in tightly coupled and thus brittle While some of REST’s constraints such as stateless interaction, systems.