- Full text PDF available (19)
I propose a novel theory of concealed questions that treats them as ascriptions of de re-belief. I adopt Aloni (2000)'s theory of conceptual covers and require that the context supplies a suitable identifier in addition to the one expressed by the argument DP of the concealed question predicate. The theory accounts for the core examples discussed in the… (More)
Successful self-regulated learning in a personalized learning environment (PLE) requires self-monitoring of the learner and reflection of learning behaviour. We introduce a tool called CAMera for monitoring and reporting on learning behaviour and thus for supporting learning reflection. The tool collects usage metadata from diverse application programs,… (More)
We present new ways of detecting semantic relations between learning resources, e. g. for recommendations, by only taking their usage but not their content into account. We take concepts used in linguistic lexicology and transfer them from their original field of application, i. e. sequences of words, to the analysis of sequences of resources extracted from… (More)
Recommender systems are widely used online to support users in finding relevant information. They can be based on different techniques such as content-based and collaborative filtering. In this paper, we introduce a new way of similarity calculation for item-based collaborative filtering. Thereby we focus on the usage of an object and not on the object's… (More)
Optimal accentuation of a sentence involves accentuating a minimal set of words which in a given context suffices for understanding the entire sentence. We propose a model of the interpretation of incomplete or not entirely recognized utterances. Using this model, we determine which constituents of an utterance have to be accentuated given a certain… (More)
— The growing amount of available information on the internet makes the process of filtering appropriate information an increasing challenge. Because currently existing approaches provide insufficient results in many cases, we propose a new way of relating objects based on their usage. We assume that objects which are significantly often used in the same… (More)
We are presenting a tool for collecting and analysing computer usage data. The observed data are locally used by the user to self-monitor and self-reflect her behaviour, decontrolling the data for personalisation of information environments only with her consent.