2008
Autores
Morgado, L; Kahn, K;
Publicação
JOURNAL OF VISUAL LANGUAGES AND COMPUTING
Abstract
ToonTalk is a child-oriented programming language whose environment is an animated virtual world, with objects that children can pick up and use as in a game, such as birds, trucks, and robots, providing direct child-oriented metaphors for programming constructs. Actions performed by a programmer's avatar with these objects are both code and coding. ToonTalk is a powerful system, not just a "toy" system: it is based upon concurrent constraint programming languages, and programs written in languages such as Flat Guarded Horn Clauses and Flat Concurrent Prolog can be straightforwardly constructed in ToonTalk. However, there is not a specification of ToonTalk, for ready implementation in other environments. We propose that the ToonTalk language lies not in the animations displayed by the current environment, but on the actions performed by the programmer with virtual world objects; we present a description and analysis of the methods the ToonTalk language provides to programmers for expressing programs.
2008
Autores
Madeira, A; Antunes, R; Morgado, L; Pereira, A;
Publicação
Iberian Conference on Information Systems and Technologies, CISTI
Abstract
2008
Autores
Harrell, SV; Abrahamson, D; Morgado, L; Esteves, M; Valcke, M; Vansteenbrugge, H; Rosenbaum, E; Barab, S;
Publicação
Computer-Supported Collaborative Learning Conference, CSCL
Abstract
Four research projects used Second Life", a 3D virtual-world platform, to investigate aspects of technology-enhanced STEM education. These European and USA studies, which differ in their pedagogical-philosophy commitments, theoretical frameworks, methodologies, and target content, critically examine a range of cognitive, affective, technical, and social factors pertaining to the prospects of students' and teachers' successful engagement with immersive microworlds. Specifically, each project describes students' successes and challenges in creating complex virtual artifacts and collaborating in real time with peers and the broader community. The design-based research studies of mathematical and computational literacy present sample student artifacts and discuss the learning they evidence. Collectively, we posit that overcoming the following obstacles could make virtual worlds both effective and exciting learning environments: professional development (technical skill, affective disposition), collaboration with school systems (logistics of access, allocation of resources), alignment with targeted content (harnessing students' creative divergence), and initial learning curves (issues of teacher-to-student ratio).
2008
Autores
Bernardo, M; Morgado, L; Rabadao, C;
Publicação
ACTAS DE LA III CONFERENCIA IBERICA DE SISTEMAS Y TECNOLOGIAS DE LA INFORMACION, VOL 1
Abstract
2008
Autores
Matias, R; Moura, JP; Martins, P; Rodrigues, F;
Publicação
ICEIS 2008: PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL AIDSS: ARTIFICIAL INTELLIGENCE AND DECISION SUPPORT SYSTEMS
Abstract
It is stated that a closer intervention of experts in knowledge discovery can complement and improve the effectiveness of results. Normally, in data mining, automated methods display final results through visualization methods. A more active intervention of experts on automated methods can bring enhancements to the analysis; No meanwhile that approach raises questions about what is a relevant stopping stage. In this work, efforts are made to couple automatic methods with visualization methods in the context of partitioning algorithms applied to spatial data. A data mining workflow is presented with the following concepts: data mining transaction, data mining save point and data mining snapshot. Moreover to display results, novel visual metaphors are changed allowing a better exploration of clustering. In knowledge discovery, experts validate final results; certainly it would be appropriate to them validate intermediate results, avoiding, for instance, losing time, when in disagreement, starting it with new hypnoses or allow data reduction by disable an intermediate cluster from the next stage.
2008
Autores
Silva, F; Filipe, V; Pereira, A;
Publicação
3rd International Conference on Systems and Networks Communications, ICSNC 2008, Sliema, Malta, October 26-31, 2008
Abstract
Radio Frequency Identification (RFID) is one of the automatic identification technologies more in vogue nowadays. There is a wide research and development in this area trying to take maximum advantage of this technology, and in coming years many new applications and research areas will continue to appear. This sudden interest in RFID also brings about some concerns, mainly the security and privacy of those who work with or use tags in their everyday life. RFID has, for some time, been used to access control in many different areas, from asset tracking to limiting access to restricted areas. In this paper we propose an architecture and a prototype of a system that uses distributed RFID over Ethernet and we demonstrate how to automate an entire students' attendance registration system by using RFID in an educational institution environment. Although the use of RFID systems in educational institutions is not new, it is intended to show how the use of it came to solve daily problems in our university. © 2008 IEEE.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.