Components of a Model of Context-Sensitive Hypertexts
نویسنده
چکیده
On the background of rising Intranet applications the automatic generation of adaptable, context-sensitive hypertexts becomes more and more important [El-Beltagy et al., 2001]. This observation contradicts the literature on hypertext authoring, where Information Retrieval techniques prevail, which disregard any linguistic and context-theoretical underpinning. As a consequence, resulting hypertexts do not manifest those schematic structures, which are constitutive for the emergence of text types and the context-mediated understanding of their instances, i.e. natural language texts. This paper utilizes Systemic Functional Linguistics (SFL) and its context model as a theoretical basis of hypertext authoring. So called Systemic Functional Hypertexts (SFHT) are proposed, which refer to a stratified context layer as the proper source of text linkage. The purpose of this paper is twofold: First, hypertexts are reconstructed from a linguistic point of view as a kind of supersign, whose constituents are natural language texts and whose structuring is due to intraand intertextual coherence relations and their context-sensitive interpretation. Second, the paper prepares a formal notion of SFHTs as a first step towards operationalization of fundamental text linguistic concepts. On this background, SFHTs serve to overcome the theoretical poverty of many approaches to link generation.
منابع مشابه
CAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملA context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملDiscovering the Underlying Components Affecting the Usability of IoT in Iranian Libraries: A Theory Based on Context
Objective: The aim is to discover the underlying context components of IOT usability in Iranian libraries: A qualitative approach consistent with grounded theory. Method: This qualitative study was conducted based on grounded theory. Data were collected through semi-structured interviews with 13 faculty members of knowledge and information science based on purposeful and chain methods. Responsi...
متن کاملModel of Process Critique of Contemporary Residential Works Based on the components: "Mission, Objectives, Functional Needs and Concepts
The formation of a designer's personality and the acquisition of design skills are dependent on specific components and variables, such as observation and sampling, analysis and handling of samples, direct involvement and impregnation with the design problem. Architectural critique and analysis of the works of the past and successful and unsuccessful examples have always played a key role in ar...
متن کاملLanguage Learners' Imagined Communities: Model and Questionnaire Development in the Iranian Context
This study aimed to overcome the researchers' extreme attention to essentially qualitative methods in research on language learners' imagined communities and move towards quantification in order to achieve a more tangible image of this construct. To do so, the present researchers followed three main phases. First, a hypothesized model of language learners' imagined communities with eight compon...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. UCS
دوره 8 شماره
صفحات -
تاریخ انتشار 2002