Annotation Et Annotations

Total Page:16

File Type:pdf, Size:1020Kb

Annotation Et Annotations Modèles et outils logiciels pour l’annotation sémantiquede documentspédagogiques Dominique Mille To cite this version: Dominique Mille. Modèles et outils logiciels pour l’annotation sémantiquede documentspédagogiques. Autre [cs.OH]. Université Joseph-Fourier - Grenoble I, 2005. Français. tel-00011468 HAL Id: tel-00011468 https://tel.archives-ouvertes.fr/tel-00011468 Submitted on 26 Jan 2006 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Université Joseph Fourier – Grenoble I U.F.R. Informatique et Mathématiques Appliquées THÈSE Présentée par Dominique Mille Pour l’obtention du grade de Docteur de L’Université Joseph Fourier – Grenoble Spécialité Informatique MODELES ET OUTILS LOGICIELS POUR L’ANNOTATION SEMANTIQUE DE DOCUMENTS PEDAGOGIQUES Thèse soutenue le 16 Octobre 2005 devant la commission d’examen. Composition du jury : Cyrille DESMOULINS Directeur Florence MICHAU Président Jean-Pierre PEYRIN Directeur Philippe TRIGANO Rapporteur Maïa WENTLAND Rapporteur Thèse préparée au sein de l’équipe ARCADE du laboratoire CLIPS de la fédération IMAG Remerciements Je remercie Florence Michau pour avoir accepté de présider le jury de ma thèse, ainsi que Philippe Trigano et Maïa Wentland pour avoir accepté d’être rapporteurs, tâche coûteuse en temps et en énergie. Je remercie mes deux directeurs de thèse, globalement pour leur patience et leur indulgence, et plus précisément Cyrille Desmoulins pour m’avoir guidée scientifiquement, et et Jean-Pierre Peyrin pour ses remarques et ses encouragements. Je remercie également Michel Dubois, du Laboratoire de Psychologie Sociale, pour sa contribution à nos expérimentations. Je remercie les membres de l’équipe ARCADE pour m’avoir accueillie pendant cinq ans en m’accompagnant dans mon apprentissage de la recherche. Au sein de cette équipe, je remercie particulièrement Dima pour avoir été une co-bureau exemplaire, alliant discrétion et dynamisme. Plus largement, je remercie les membres du laboratoire qui ont égayé ma période de thèse par leur compagnie, leurs discussions et leurs sourires. Je remercie également les membres de ma famille pour leur soutien inconditionnel et leurs encouragements permanents. Enfin, je remercie tous ceux qui m’ont aidée, que ce soit par leurs apports scientifiques, leur soutien moral ou tout simplement leur patience, et je présente ici mes excuses à tous ceux qui ont subi injustement les tensions liées à ma thèse. TABLE DES MATIERES Chapitre 1 - Introduction ..................................................................................................................................... 9 1.1. Contexte : le concept d’annotation.............................................................................................................. 9 1.1.1. Utilité de l’annotation.......................................................................................................................... 9 1.1.2. Intérêt de l’annotation électronique................................................................................................... 10 1.1.3. Importance de la sémantique des annotations.................................................................................... 11 1.2. Objectif...................................................................................................................................................... 12 1.3. Problématique............................................................................................................................................ 13 1.3.1. Formalismes existant ......................................................................................................................... 13 1.3.2. Logiciels existants ............................................................................................................................. 13 1.3.3. Annotation électronique par des apprenants...................................................................................... 14 1.3.4. Bilan .................................................................................................................................................. 14 1.4. Méthodologie ............................................................................................................................................ 15 PARTIE 1 - ETUDE DE L’EXISTANT ...................................................................... 17 Chapitre 2 - Annotation et annotations............................................................................................................. 19 2.1. Lecture active ............................................................................................................................................ 19 2.1.1. Lecture active et lecture passive........................................................................................................ 19 2.1.2. Lecture active et annotation............................................................................................................... 19 2.1.3. Synthèse............................................................................................................................................. 20 2.2. Définition de l’annotation ......................................................................................................................... 20 2.2.1. Définitions informatiques hors sujet (pour nous) .............................................................................. 21 2.2.2. Définitions générales ......................................................................................................................... 21 2.2.3. Définitions spécifiques ...................................................................................................................... 22 2.2.4. Synthèse............................................................................................................................................. 24 2.3. Lecture électronique.................................................................................................................................. 24 2.3.1. Expérimentations de lecture électronique.......................................................................................... 25 2.3.2. Résultats des études sur la lecture électronique................................................................................. 26 2.3.3. Synthèse............................................................................................................................................. 30 2.4. Annotation papier et électronique ............................................................................................................. 30 2.4.1. Statut et durée de vie des annotations................................................................................................ 30 2.4.2. Représentations de l’annotation papier et électronique ..................................................................... 31 2.4.3. Formes de l’annotation ...................................................................................................................... 33 2.4.4. Lieux de l’annotation (ancres)........................................................................................................... 34 2.4.5. Sémantique de l’annotation (objectif et contexte) ............................................................................. 35 2.5. Dépendances entre formes et objectifs ...................................................................................................... 38 2.5.1. Dépendances générales...................................................................................................................... 38 2.5.2. Dépendances individuelles ................................................................................................................ 39 2.6. Utilisation des annotations ........................................................................................................................ 40 2.7. Conclusion................................................................................................................................................. 40 Chapitre 3 - Logiciels et matériels ..................................................................................................................... 43 3.1. Adobe Acrobat .......................................................................................................................................... 43 3.1.1. Présentation générale......................................................................................................................... 43 3.1.2. Catégorie Notes ................................................................................................................................. 43 3.1.3. Catégorie Annotations Graphiques.................................................................................................... 44 3.1.4. Catégorie Marquages de Texte .......................................................................................................... 44 3.1.5. Fonctionnalités
Recommended publications
  • How to Cure Windows 10'S Worst Headaches These Tips and Tricks Can Help You Overcome Windows 10'S Niggling Hassles
    How to cure Windows 10's worst headaches These tips and tricks can help you overcome Windows 10's niggling hassles. Ian Paul | @ianpaul Contributor, PCWorld Aug 26, 2015 3:30 AM After the Windows 8 disaster, upgrading to Windows 10 is almost palpably refreshing. Microsoft’s new operating system brings back PC-focused features it should never have lost and adds some helpful new integrations with Microsoft services. It’s not perfect, though. Despite the many highlights of Windows 10—Cortana, virtual desktops, windowed Windows Store apps, the revamped Start menu, DirectX 12, among others—there are still some annoyances with the new operating system. Windows 10 can reset your default browser if you upgrade; updates are now mandatory; and behind the scenes, the new OS is a file-sharing machine. Those are just a few of Windows 10’s notable headaches, but the good news is there are fixes for all these problems. Even better? Most are really easy to implement. Let’s dig in. Tame Windows 10’s forced updates Windows 10 home users are now pretty much required to accept and install updates at the time and choosing of Microsoft. This can be disastrous if you get a bad update that bricks your system or puts it in an endless reboot cycle, or if you have to download updates on a metered connection. Luckily, there are solutions for both. For the latter, all you have to do is set your Wi-Fi connection to metered—though note that Microsoft does not allow you to set ethernet connections as metered.
    [Show full text]
  • Libraries and Mobile Technologies
    On the Move with the Mobile Web: Libraries and Mobile Technologies Ellyssa Kroski http://www.ellyssakroski.com Kroski, Ellyssa On the Move with the Mobile Web: Libraries and Mobile Technologies Chapter One: What is the Mobile Web?............................................................................................3 The Mobile Web Defined.............................................................................................................. 3 Who Are the Early Adopters? ....................................................................................................... 3 What Are People Doing with Their Mobile Devices? .................................................................. 4 Benefits of the Mobile Web .......................................................................................................... 6 Mobile Web Challenges ................................................................................................................ 6 Mobile Web Resources & Reports................................................................................................ 7 Notes ............................................................................................................................................. 8 Chapter 2: Mobile Devices ............................................................................................................. 10 Mobile Phone Devices ................................................................................................................ 10 Mobile Phone Manufacturers.......................................................................................................11
    [Show full text]
  • Challenges Ahead for Adobe's Portable Document Format
    Volume 21, Number 2 - April 2005 through June 2005 Challenges Ahead for Adobe’s Portable Document Format By Dr. Paul Cesarini and Mr. Jason Mellen Peer-Refereed Article KEYWORD SEARCH Computer Technology Graphic Communications Information Technology Internet Philosophy Visual Communications The Official Electronic Publication of the National Association of Industrial Technology • www.nait.org © 2005 Journal of Industrial Technology • Volume 21, Number 2 • April 2005 through June 2005 • www.nait.org Challenges Ahead for Adobe’s Portable Document Format By Dr. Paul Cesarini and Mr. Jason Mellen Introduction: that it will become the mainstream the Promise of PDF technology for electronic communi- Dr. Paul Cesarini is an Assistant Professor in the Department of Visual Communication & Technol- Universal document exchange, that cations, document distribution, and ogy Education (VC&TE) at Bowling Green State elusive goal only slightly less far- printing / publishing workflow.” (p. 61) University. His current research and work focuses on digital rights management and the on-going fetched than the paperless office, has While the author agrees with his overall erosion of fair use for audio, video, and text. Prior largely become a reality over the past premise that the PDF is robust, mature to teaching in VC&TE, Paul created and managed the BGSU Student Technology Center, Laptop Loan few years. Adobe’s Acrobat line of technology with great potential, it may Program, and annual Technology Fair. He reads not be quite so clear-cut. Wired far too much. products, recently released in their 7.0 incarnation, have steadily improved and have achieved a near-ubiquity in a va- Despite overall gains in ease-of-use and riety of industries and disciplines.
    [Show full text]
  • Electronic Books: an Overview of the First Two Generations
    East Tennessee State University Digital Commons @ East Tennessee State University Electronic Theses and Dissertations Student Works 12-2001 Electronic Books: An Overview of the First Two Generations. Todd O. Doman East Tennessee State University Follow this and additional works at: https://dc.etsu.edu/etd Part of the Reading and Language Commons Recommended Citation Doman, Todd O., "Electronic Books: An Overview of the First Two Generations." (2001). Electronic Theses and Dissertations. Paper 108. https://dc.etsu.edu/etd/108 This Thesis - Open Access is brought to you for free and open access by the Student Works at Digital Commons @ East Tennessee State University. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons @ East Tennessee State University. For more information, please contact [email protected]. E-Books: The First Two Generations A thesis presented to the faculty of the Department of English East Tennessee State University In partial fulfillment of the requirements for the degree Master of Arts in English by Todd Doman December 2001 Dr. Jeff Powers-Beck, Chair Dr. Kevin O’Donnell Dr. Darryl Haley Keywords: Electronic text, E-book, Reader ABSTRACT Electronic Books: An Overview of the First Two Generations by Todd Doman The electronic text reading device, or e-book, is an idea that has reached the implementation stage. Technology has only recently made possible the production of a device to challenge the printed book’s dominance as the media for information transmission. These microprocessor-based devices are attempts to exceed the limitations of printed texts while retaining their strengths.
    [Show full text]
  • Microsoft Reader Keyboard Shortcuts
    Microsoft Reader Keyboard Shortcuts Paul’s Most Useful keyboard shortcuts Move up and down the library page Up and Down Arrows Choose a book Return Go to next page Page Down Go to previous page Page Up Start the speech (you may have to press TAB a few times CTRL-P until a word in the text is highlighted) Stop the speech CTRL-S Slow down the speech CTRL-F9 Speed up the speech CTRL-F10 Go back to the library page ALT-L The following list describes the keyboard shortcuts you can use to quickly perform a variety of tasks: Microsoft Reader keyboard shortcuts, press: Esc - Close a menu, or Close a page F11 - Toggle from full-screen view (immersed-reading) to windowpane view F8 - Toggle visual guides on and off F1 - Help (within the Microsoft Reader) F5 - Announces your position in an eBook, if you enable the Verbosity feature ALT+F4 - Close the Microsoft Reader application TAB - Move forward through tab stops and lists of options in pop-up menus SHIFT+TAB - Move backward through tab stops and lists of options in pop-up menus SPACEBAR or ENTER - Select or clear the check box if the active item is a check box CTRL+HOME - Move to the beginning of a Microsoft Reader internal page, like the Library or Annotations screen CTRL+END - Move to the end of a Microsoft Reader internal page, like the Library or Annotations screen CTRL+ENTER - To follow a hyperlink CTRL+A - Select and highlight all text within notes and other edit boxes ALT+P - Shop ALT+S - Settings ALT+R - Return ALT+O - Library Sort ALT+E - Library Search by specific title or author ALT+G
    [Show full text]
  • Introduction to Ebooks and Ebook Readers
    An Introduc+on to eBooks and eReaders January 26, 2010 4-6 pm Barnstable High School eBooks eBook is short for electronic book. They are essen4ally electronic or digital copies of printed books and normally follow the format of their printed counterpart with table of contents, chapters, and index. However not all eBooks are found in printed form. Some authors and publishers are choosing to only offer versions of their work in eBook format because they are easier to update and maintain than tradi4onal printed texts. eBooks are not as new as most people think. In 1971 Michael S Hart began Project Gutenberg. The goal of Project Gutenberg was to preserve historical and cultural works in digital format. Volunteers take the 4me to scan or type in the text of books. Since these books and wri4ngs are in the public domain they can be freely shared and distributed. For example you may buy Jane Aus4n’s books, which are in the public domain, in paperback or read them for free in digital format. Early distribu4on of eBooks was via websites for reading on a computer (the technology was not yet available for download) or via CD where the user could copy the book on to their personal computer. eBooks have certain advantages over their printed counter parts. Most eBooks can be: searched, bookmarked, immediately downloaded, highlighted, and more are becoming interac4ve. Your eBook library is easily portable and you can store your en4re library on your desktop, laptop, smart phone, mobile device or eReader. To enable you to read eBooks on your computer or mobile device you will need eBook reading soVware.
    [Show full text]
  • Microsoft RMS: Standard Or Stranglehold? Cloud Security, Identity Management, and the Future of the Open Internet
    Sanford Bingham Founder & CEO FileOpen Systems Inc. October 6, 2016 Microsoft RMS: Standard or Stranglehold? Cloud security, identity management, and the future of the open Internet The World Wide Web is built upon standards, at every level. Because of Web standards, users can access information from multiple different browsers on a variety of platforms and operating systems, and organizations can choose from a diverse set of servers and databases to host content. This arrangement has worked well for more than twenty years, encouraging innovation and competition—as long as the information being served is intended to flow freely and without restriction. However if the contents’ owners want to control access to their information through encryption and authentication, the interoperability of the Web breaks down. The means of decrypting content for secure viewing has always required a separate, proprietary viewer or plug-in, because there is no Web standard for rights management at the file level. Opinions differ on the wisdom and feasibility of implementing DRM for consumer content on the Web (although the channeling of rights-managed content into closed platforms such as Amazon Kindle and Apple iBooks has rendered opposition somewhat futile), but the absence of a security standard in the enterprise has created a vacuum into which a private corporation (namely Microsoft) could come to dominate the creation, distribution and consumption of information from end-to-end. Imagine a scenario in which the entire document workflow of the Fortune 1000 is beholden to a single vendor for its authoring applications, user identity management, decryption keys, usage data and other private and proprietary information.
    [Show full text]
  • Corpus Distillation & Fuzzing
    Corpus distillation & fuzzing Jaanus Kääp Clarified Security Who is this guy ● Jaanus Kääp ● Working at Clarified Security – Vulnerability testing, research, trainings, cyber excercises ● Developer background (web and native) ● Multiple bug bounties: – Facebook, Adobe, Google, MS etc Why this topic ● CVE-2015-6696 Adobe Reader ● CVE-2015-6698 Adobe Reader ● CVE-2015-6978 Apple Safari ● CVE-2016-0936 Adobe Reader ● CVE-2016-0938 Adobe Reader ● CVE-2016-0939 Adobe Reader ● CVE-2016-0046 Microsoft Reader ● CVE-2016-0118 Microsoft Edge ● CVE-2016-1009 Adobe Reader ● CVE-2016-1088 Adobe Reader ● CVE-2016-1093 Adobe Reader ● CVE-2016-1094 Adobe Reader ● ZDI-15-525 Foxit Reader ● ZDI-15-524 Foxit Reader ● ZDI-15-641 Foxit Reader ● ZDI-16-029 Foxit Reader ● ZDI-16-221 Foxit Reader Topic itself ● Fuzzing basics ● Corpus distillation ● How I fuzz ● Tools I developed Fuzzing ● Automated bug/vuln finding ● Functionality – Generates input – Runs target with input – Detects crash/special condition – Rinse and repeat Detection ● Detects crashes ● Detects special exceptions (access violation) ● Detects special behaviour (DOS, error message, output) ● Target dependent Input generation ● Dumb fuzzing – Total/Stupid random – Mutations based ● Smart fuzzing – Generation based Total/Stupid random ● Examples – dd if=/dev/urandom bs=100000 count=1 > file.doc – dd if=/dev/urandom bs=1024 count=1 | telnet target 443 ● Pros – Stupid easy to create ● Cons – Relatively useless in most case Mutations based ● Mutates/changes initial set – Bit flipping – Adding long
    [Show full text]
  • Education / Istraživanja Paradigmi Djetinjstva, Odgoja I Obrazovanja
    Istraživanja paradigmi djetinjstva, odgoja i obrazovanja / Researching Paradigms of Childhood and Education / Istraživanja paradigmi djetinjstva, odgoja i obrazovanja / Researching Paradigms of Childhood and Education / Istraživanja paradigmi djetinjstva, odgoja i obrazovanja / Researching Paradigms of Childhood and Education / Istraživanja paradigmi djetinjstva, odgoja i obrazovanja simpozij / 5 V. / Re- searching Paradigms of Childhood and Education / Istraživanja paradigmi djetinjstva, odgoja i obra- zovanja / Researching Paradigms of Childhood and Education / Istraživanja paradigmi djetinjstva, th odgoja i obrazovanja / Researching Paradigms of Childhood and Education / Istraživanja paradigmi Symposium djetinjstva, odgoja i obrazovanja / Researching Paradigms of Childhood and Education / Istraživanja paradigmi djetinjstva, odgoja i obrazovanja / Researching Paradigms of Childhood and Education / Istraživanja paradigmi djetinjstva, odgoja i obrazovanja / Researching Paradigms of Childhood and Education / Istraživanja paradigmi djetinjstva, odgoja i obrazovanja / Researching Paradigms of Childhood and Education / Istraživanja paradigmi djetinjstva, odgoja i obrazovanja / Researching Paradigms of Childhood and Education / Istraživanja paradigmi djetinjstva, odgoja i obrazovanja / Re- searching Paradigms of Childhood and Education / Istraživanja paradigmi djetinjstva, odgoja i obra- zovanja / Researching Paradigms of Childhood and Education / Istraživanja paradigmi djetinjstva, odgoja i obrazovanja / Researching13. – Paradigms15. 4. 2015.
    [Show full text]
  • Intrusion Policy Report Test
    Intrusion Policy Report Test Modified By admin Last Modified 2018-12-20 09:32:11 (UTC) Table of Contents Policy Information.........................................................................................................................................................................................................................1 Firepower Recommendations......................................................................................................................................................................................................1 Advanced Settings........................................................................................................................................................................................................................1 Global Rule Thresholding................................................................................................................................................................................................1 Sensitive Data Detection.................................................................................................................................................................................................1 Rules...............................................................................................................................................................................................................................................2 i Policy Information Name Test Description Test Policy Drop when Inline Enabled
    [Show full text]
  • Preserving Ebooks 1
    01000100 01010000 Preserving 01000011 eBooks 01000100 01010000 Amy Kirchhoff and Sheila Morrissey 01000011 01000100 DPC Technology Watch Report 14-01 June 2014 01010000 01000011 01000100 01010000 Series editors on behalf of the DPC 01000011 Charles Beagrie Ltd. Principal Investigator for the Series 01000100 Neil Beagrie 01010000 01000011DPC Technology Watch Series © Digital Preservation Coalition 2014 – and Amy Kirchhoff and Sheila M. Morrissey 2014 ISSN: 2048-7916 DOI: http://dx.doi.org/10.7207/twr14-01 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, without the prior permission in writing from the publisher. The moral rights of the authors have been asserted. First published in Great Britain in 2014 by the Digital Preservation Coalition. Foreword The Digital Preservation Coalition (DPC) is an advocate and catalyst for digital preservation, ensuring our members can deliver resilient long-term access to digital content and services. It is a not-for-profit membership organization whose primary objective is to raise awareness of the importance of the preservation of digital material and the attendant strategic, cultural and technological issues. It supports its members through knowledge exchange, capacity building, assurance, advocacy and partnership. The DPC’s vision is to make our digital memory accessible tomorrow. The DPC Technology Watch Reports identify, delineate, monitor and address topics that have a major bearing on ensuring our collected digital memory will be available tomorrow. They provide an advanced introduction in order to support those charged with ensuring a robust digital memory, and they are of general interest to a wide and international audience with interests in computing, information management, collections management and technology.
    [Show full text]
  • Microsoft Reader Books for All Introduction User Guide Microsoft Reader Is a Free Program for Reading ‘Ebooks’ (Electronic Books) in ‘LIT’ Format
    Microsoft Reader Books for All Introduction User Guide Microsoft Reader is a free program for reading ‘eBooks’ (electronic books) in ‘LIT’ format. eBooks are electronic versions of paper books. You can download Microsoft Reader from http://www.microsoft.com/reader. There are different versions for desktop, laptop, tablet and pocket PCs. Microsoft Reader is reasonably accessible for people with disabilities. You can access books using the mouse and there are keyboard shortcuts for most operations. A particularly good feature for people with visual and reading difficulties is the free built-in text-to-speech which highlights the text as it reads. This means that Microsoft Reader is much more accessible for many people than Adobe Digital Editions, for example. Readers with severe visual impairment will probably find that Microsoft Reader is not as accessible as Daisy book readers: it doesn’t have the same degree of control over the voice and navigation. Readers with physical impairments may find that Adobe Reader offers more options for navigation; Adobe Reader also allows you to magnify the text size far more than Microsoft Reader, and to change the background and text colour, which you can’t do in Microsoft Reader. The Microsoft Reader text-to-speech works on the desktop, laptop and tablet versions (i.e. not on Windows Mobile). Annoyingly, the TTS won’t read “premium content” eBooks (i.e. most commercial ones that cost money) because of copyright and rights issues, but it can read books you make yourself. You can download the Text to Speech package free from http://www.microsoft.com/reader/developers/downloads/tts.aspx.
    [Show full text]