Abstract. A ubiquitous wearable computing infrastructure is now firmly entrenched within organizations across the globe, yet much of its potential remains untapped. This paper desc...
A key challenge in ubiquitous computing is how to manage ambient information about the environment where a variety of devices appear. Traditional capability descriptions are inadeq...
Requirements for educational software could be based on an analysis of existing learning situations. In order to obtain useful information about teaching practices, an explorative ...
Luca Tateo, Giuseppina Marsico, Maria Annarumma, G...
We present a principled approach to the problem of connecting a controlled document authoring system with a knowledge base. We start by describingclosed-world authoring situations...
This paper is a first step towards a computational account of Binding Theory (BT). Two algorithms that compute, respectively, Principle A and B have been provided. Particular atte...