Capture of Lifecycle Information in Proprietary Office Applications

نویسندگان

  • Lasse Lehmann
  • Christoph Rensing
  • Ralf Steinmetz
چکیده

Lifecycle information like e.g. relations resulting from re-use of Learning Resources and knowledge documents can be utilized to support search, retrieval and authoring of Learning Resources. We describe challenges that have to be faced when capturing lifecycle information in proprietary office applications like PowerPoint and show how we solved them in the implementation of ReCap.KOM add-ins for our LIS.KOM framework. Results of first evaluations are promising.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Developing a BIM-based Spatial Ontology for Semantic Querying of 3D Property Information

With the growing dominance of complex and multi-level urban structures, current cadastral systems, which are often developed based on 2D representations, are not capable of providing unambiguous spatial information about urban properties. Therefore, the concept of 3D cadastre is proposed to support 3D digital representation of land and properties and facilitate the communication of legal owners...

متن کامل

The Relationship between Lifecycle and Idiosyncratic Volatility with Emphasis on Fundamental and Information Uncertainty of Firms listed on the TSE

According to the importance and the increasing trend of idiosyncratic volatility in recent years, the study of factors affecting idiosyncratic volatility is one of the important issues in financial markets. So, the purpose of this study is to investigate the relationship between lifecycle and idiosyncratic volatility with emphasis on fundamental and information uncertainty. In this regard, 152 ...

متن کامل

Comparing the relative importance of evaluation criteria in proprietary and open-source enterprise application software selection - a conjoint study of ERP and Office systems

Until recently, organizations willing to acquire application systems have had no choice but to adopt proprietary software. With the advent of open-source software (OSS), a new model for developing and distributing software has entered the stage. OSS has evolved from a generally horizontal infrastructure towards more highly visible applications in vertical domains, giving information systems (IS...

متن کامل

Reverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages

Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...

متن کامل

Nistir 7173 Information Models for Product Representation: Core and Assembly Models

This report presents a revised and unified view of the NIST Core Product Model (CPM) [1; 2] and the NIST Open Assembly Model (OAM) [3]. The CPM provides a base-level product model that is not tied to any vendor software; open; non-proprietary; simple; generic; expandable; independent of any one product development process; and capable of capturing the engineering context that is shared througho...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008