summaryrefslogtreecommitdiff
ModeNameSize
l---------Allemang2011 -.pdf -> .git/annex/objects/1M/j9/SHA256E-s20789662--b99935c47d922c77b12fbce8cab55462254d5910dc89d89318d62330835f0389.pdf/SHA256E-s20789662--b99935c47d922c77b12fbce8cab55462254d5910dc89d89318d62330835f0389.pdf200logplain
l---------Allemang2020ch1 - What Is the Semantic Web_.pdf -> .git/annex/objects/5w/Q1/SHA256E-s907577--6a0d584c39d79ef8dd9374e26e63af806ccf3e8476231d43b177f1e0dd6e371b.pdf/SHA256E-s907577--6a0d584c39d79ef8dd9374e26e63af806ccf3e8476231d43b177f1e0dd6e371b.pdf196logplain
l---------Allemang2020ch2 - Semantic Modelling.pdf -> .git/annex/objects/G5/92/SHA256E-s398847--5966d5b327677931074c7257cf784e0b329f91f7e10dbce46d86d3b3788ed9f4.pdf/SHA256E-s398847--5966d5b327677931074c7257cf784e0b329f91f7e10dbce46d86d3b3788ed9f4.pdf196logplain
l---------Allemang2020ch3 - The Basis of the Semantic Web.pdf -> .git/annex/objects/Wp/m7/SHA256E-s1253555--f134de58f4f88934f7e3f82da1f2d5403f561293b4fa56ba7d741cb91645db5d.pdf/SHA256E-s1253555--f134de58f4f88934f7e3f82da1f2d5403f561293b4fa56ba7d741cb91645db5d.pdf198logplain
l---------Allemang2020ch4 - Semantic Web Application Architecture.pdf -> .git/annex/objects/XW/4x/SHA256E-s474893--d814e91bdaa8e98a5b56df1c25eb035e1b10f46fcd9b7eb4650aaad3c03cbe58.pdf/SHA256E-s474893--d814e91bdaa8e98a5b56df1c25eb035e1b10f46fcd9b7eb4650aaad3c03cbe58.pdf196logplain
l---------Allemang2020ch5 - Linked Data.pdf -> .git/annex/objects/2z/fX/SHA256E-s4134926--d92cfa80f6c010f7135cde9899046b6f431ef876c8f500e60faf551eccf54126.pdf/SHA256E-s4134926--d92cfa80f6c010f7135cde9899046b6f431ef876c8f500e60faf551eccf54126.pdf198logplain
l---------Allemang2020ch6 - Querying the Semantic Web—SPARQL.pdf -> .git/annex/objects/Gx/Q0/SHA256E-s1688933--0587968f623488ad46759c5666506242bf977ca79310ab3f3965ed6f2bfda63a.pdf/SHA256E-s1688933--0587968f623488ad46759c5666506242bf977ca79310ab3f3965ed6f2bfda63a.pdf198logplain
l---------Allemang2020preface -.pdf -> .git/annex/objects/Qm/9Q/SHA256E-s111067--775563d49596f34921e6773610b074490d90c4b7ecd6885f3359976efef35199.pdf/SHA256E-s111067--775563d49596f34921e6773610b074490d90c4b7ecd6885f3359976efef35199.pdf196logplain
l---------Andersen2015 -.pdf -> .git/annex/objects/1g/86/SHA256E-s211861--47409e60a242cfb467834a77b2010b3166ba9a116f197826cb0f949e091e33f8.pdf/SHA256E-s211861--47409e60a242cfb467834a77b2010b3166ba9a116f197826cb0f949e091e33f8.pdf196logplain
l---------Arantes2022 - The SAMR Model As a Framework for Scaffolding Online Chat_ A theoretical Discussion of the SAMR Model As a Research Method during These “interesting” Times.pdf -> .git/annex/objects/M6/Pp/SHA256E-s378389--a7bd2b389efd5f7f49ea285aa0040ecd2b7d9543fb1e0103518927d4d57ee843.pdf/SHA256E-s378389--a7bd2b389efd5f7f49ea285aa0040ecd2b7d9543fb1e0103518927d4d57ee843.pdf196logplain
l---------Bento2022 - Do Arduinos Dream of Efficient Reasoners_.pdf -> .git/annex/objects/x3/K0/SHA256E-s413578--0562cffb8270400697e2ebea8f613a905e92e5f9a6eacff70b347fdcecf92ed2.pdf/SHA256E-s413578--0562cffb8270400697e2ebea8f613a905e92e5f9a6eacff70b347fdcecf92ed2.pdf196logplain
-rw-r--r--Bera2011 - Guidelines for Designing Visual Ontologies to Support Knowledge Identification.pdf102logplain
-rw-r--r--Bjorn2006 - Medieret Vejledning Af Problemorienteret Projektarbejde.pdf90638logplain
-rw-r--r--Conole2013 - Designing for Learning in an Open World.pdf102logplain
l---------Diefenbach2021 - Wikibase As an Infrastructure for Knowledge Graphs.pdf -> .git/annex/objects/5v/01/SHA256E-s5610575--fdfe44caccee7396a7c6c6de85c1c9a09b336e0949f50d523d808c6ade6c79f4.pdf/SHA256E-s5610575--fdfe44caccee7396a7c6c6de85c1c9a09b336e0949f50d523d808c6ade6c79f4.pdf198logplain
-rw-r--r--Doerner2017 - Complex Problem Solving_ What It Is and What It Is Not.pdf101logplain
l---------Ebersbach2006 -.pdf -> .git/annex/objects/8g/MV/SHA256E-s312413--116d720adf7e268a0eb20ab162b89f6119dbfecc96e59ae21af602fffccf118c.pdf/SHA256E-s312413--116d720adf7e268a0eb20ab162b89f6119dbfecc96e59ae21af602fffccf118c.pdf196logplain
l---------Faerber2021 - The Data Set Knowledge Graph_ Creating a Linked Open Data Source for Data Sets.pdf -> .git/annex/objects/58/JV/SHA256E-s1451988--4d396a968138829347ac497db5857b1c31c1d38a3db3cfb40de34a589019459c.pdf/SHA256E-s1451988--4d396a968138829347ac497db5857b1c31c1d38a3db3cfb40de34a589019459c.pdf198logplain
l---------Ferrucci2010 - Building Watson_ an Overview of the DeepQA Project.pdf -> .git/annex/objects/Qg/22/SHA256E-s688740--164e696ee3b1a2b27822eec98e0fac559a09e28b879369f82c93c6d942735e93.pdf/SHA256E-s688740--164e696ee3b1a2b27822eec98e0fac559a09e28b879369f82c93c6d942735e93.pdf196logplain
l---------Frederiksen2016 - Hypothes.is Nyt Plug in I OJS.pdf -> .git/annex/objects/k1/2Z/SHA256E-s1661893--7c9781b0e76334dcc48929a035cce919097df11d96eb5f9629c6feba7666a662.pdf/SHA256E-s1661893--7c9781b0e76334dcc48929a035cce919097df11d96eb5f9629c6feba7666a662.pdf198logplain
l---------Goy2017 - An Integrated Support to Collaborative Semantic Annotation.pdf -> .git/annex/objects/J4/k4/SHA256E-s2564437--cf76dd76af3b4080c19911e8463cf5da5c67da516f4498e13988a9f1cecb418e.pdf/SHA256E-s2564437--cf76dd76af3b4080c19911e8463cf5da5c67da516f4498e13988a9f1cecb418e.pdf198logplain
l---------Graf2021kap1 - ET NYT KONCEPT fOR INKLUDERENDE DIGITAL PROJEKTDIDAKTIK.pdf -> .git/annex/objects/PV/Xj/SHA256E-s725879--6bd0b4795a37915dde186b72e8814c1822e3d8494c964cc121c782c008d404de.pdf/SHA256E-s725879--6bd0b4795a37915dde186b72e8814c1822e3d8494c964cc121c782c008d404de.pdf196logplain
l---------Hamilton2016 - The Substitution Augmentation Modification Redefinition (SAMR) Model_ a Critical Review and Suggestions for Its Use.pdf -> .git/annex/objects/6J/Pj/SHA256E-s960258--679c63ef4ab34487aa7e9c98f5fac3a39c85e7337610b74199b8919bd42a4d22.pdf/SHA256E-s960258--679c63ef4ab34487aa7e9c98f5fac3a39c85e7337610b74199b8919bd42a4d22.pdf196logplain
l---------Heilesen2016 - Projektarbejde Og Akademisk IT Skoling.pdf -> .git/annex/objects/fJ/Jk/SHA256E-s1580369--969e5f3358234b7f08991baca27161c063820e071678536afd6027eb3e9b2a5b.pdf/SHA256E-s1580369--969e5f3358234b7f08991baca27161c063820e071678536afd6027eb3e9b2a5b.pdf198logplain
l---------Hitzler2021 - A Review of the Semantic Web Field.pdf -> .git/annex/objects/5Q/Zw/SHA256E-s1738136--3daf26bde8f7b36e7a4bd1a9c9e55913b921c60f7355ce7cb576314252c56b63.pdf/SHA256E-s1738136--3daf26bde8f7b36e7a4bd1a9c9e55913b921c60f7355ce7cb576314252c56b63.pdf198logplain
l---------Hoyt2023 - Open Code, Open Data, and Open Infrastructure to Promote the Sustainability of Curated Scientific Resources.pdf -> .git/annex/objects/32/z4/SHA256E-s299462--6fb54b29a88d1a0f898eb7f46c4785a5ccd860fd8859b34f2fc509bda695b722.pdf/SHA256E-s299462--6fb54b29a88d1a0f898eb7f46c4785a5ccd860fd8859b34f2fc509bda695b722.pdf196logplain
l---------Illeris2018 -.pdf -> .git/annex/objects/34/1G/SHA256E-s3530599--ecf3e34d8a6273e98a3be8ad3b4e65f7b6f9e72776248b097b5d1624816ca514.pdf/SHA256E-s3530599--ecf3e34d8a6273e98a3be8ad3b4e65f7b6f9e72776248b097b5d1624816ca514.pdf198logplain
l---------Janowicz2014 - Five Stars of Linked Data Vocabulary Use.pdf -> .git/annex/objects/pv/mj/SHA256E-s473976--672a5eb8d5c9f7c5f096364c402157d4e5f8e6abbc7e5116c3c604489aece19d.pdf/SHA256E-s473976--672a5eb8d5c9f7c5f096364c402157d4e5f8e6abbc7e5116c3c604489aece19d.pdf196logplain
-rw-r--r--Jorgensen2019 - TRIN Modellen Er Ikke En Metode.pdf71697logplain
l---------Kanza2019 - Too Many Tags Spoil the Metadata.pdf -> .git/annex/objects/jK/5f/SHA256E-s2215080--8a84debd1ed7be66f43637f422a6af9c3e30d94f7865b468fb16c752e55e4a69.pdf/SHA256E-s2215080--8a84debd1ed7be66f43637f422a6af9c3e30d94f7865b468fb16c752e55e4a69.pdf198logplain
l---------Kararo2019 - Annotated Primary Scientific Literature_ a Pedagogical Tool for Undergraduate Courses.pdf -> .git/annex/objects/38/68/SHA256E-s1045608--bcdf2534083f584cb6b49af4161f591844291dc567acd28338bb6987ccfaee64.pdf/SHA256E-s1045608--bcdf2534083f584cb6b49af4161f591844291dc567acd28338bb6987ccfaee64.pdf198logplain
l---------Lohmann2016 - Visualizing Ontologies with VOWL.pdf -> .git/annex/objects/vg/g2/SHA256E-s2868099--f6ad0e31d8ba985e9ac83daa1e6d6c34a909b08abfa5fe6c4e30f92cce190e5c.pdf/SHA256E-s2868099--f6ad0e31d8ba985e9ac83daa1e6d6c34a909b08abfa5fe6c4e30f92cce190e5c.pdf198logplain
l---------Lund2020 - Bæredygtighedspædagogik Og Handlekompetence Et Velkommen Tilbage Til 70’erne_.pdf -> .git/annex/objects/Z5/Gz/SHA256E-s247838--81b9e6088a5928cd498b4bd988aa416779b6628d21ac1275ba5b7d6036c24143.pdf/SHA256E-s247838--81b9e6088a5928cd498b4bd988aa416779b6628d21ac1275ba5b7d6036c24143.pdf196logplain
l---------Ngwenya2018 - An Ontology Based E Learning Assessment System for Online Learners in Higher Learning Institutions.pdf -> .git/annex/objects/gw/K4/SHA256E-s1253075--3289383276370b194f7a7f58ed551ad3d41abd451ff35a74bcfc8c0614e0989c.pdf/SHA256E-s1253075--3289383276370b194f7a7f58ed551ad3d41abd451ff35a74bcfc8c0614e0989c.pdf198logplain
l---------Nielsen2017 - Scholia, Scientometrics and Wikidata.pdf -> .git/annex/objects/wv/Mg/SHA256E-s3008190--27846550a55c39d8eabf5e1c69607e92b44260d3c187e388470d1af5b8496ebf.pdf/SHA256E-s3008190--27846550a55c39d8eabf5e1c69607e92b44260d3c187e388470d1af5b8496ebf.pdf198logplain
l---------Ragab2024DESERE - DESERE.pdf -> .git/annex/objects/qw/87/SHA256E-s111196--c11d36381d3641fe3544b94d695b4c523bd0ddb90cef146c72d88c53b44b9d50.pdf/SHA256E-s111196--c11d36381d3641fe3544b94d695b4c523bd0ddb90cef146c72d88c53b44b9d50.pdf196logplain
l---------Rasberry2019 - Robustifying Scholia_ Paving the Way for Knowledge Discovery and Research Assessment through Wikidata.pdf -> .git/annex/objects/5Q/5W/SHA256E-s2699762--8e68f742a7c37380223027804f2eb4619a5e7f05df7c00418d5816ed96f7fc6c.pdf/SHA256E-s2699762--8e68f742a7c37380223027804f2eb4619a5e7f05df7c00418d5816ed96f7fc6c.pdf198logplain
l---------Sahli2022 - Knowledge Visualization.pdf -> .git/annex/objects/1w/q0/SHA256E-s1005422--ea7ae5176c992ab8dd6ceebc96f7cbe717bcafbb4dc26d6ac60ac98e2fe2f3ff.pdf/SHA256E-s1005422--ea7ae5176c992ab8dd6ceebc96f7cbe717bcafbb4dc26d6ac60ac98e2fe2f3ff.pdf198logplain
l---------Schraube2024 - Digitalization and Learning As a Worlding Practice.pdf -> .git/annex/objects/KJ/G1/SHA256E-s9783617--01779bc44cd233ead9d6a2a425e1070a9ca9c2ab9d716dcd872ef53f3a718f5d.pdf/SHA256E-s9783617--01779bc44cd233ead9d6a2a425e1070a9ca9c2ab9d716dcd872ef53f3a718f5d.pdf198logplain
l---------Selvan2023 - Operating Critical Machine Learning Models in Resource Constrained Regimes.pdf -> .git/annex/objects/ZK/17/SHA256E-s889113--a31f2d97dc3068ca8d3d648d085b3f30bd51b54e62cff250507287ed298eb8f5.pdf/SHA256E-s889113--a31f2d97dc3068ca8d3d648d085b3f30bd51b54e62cff250507287ed298eb8f5.pdf196logplain
l---------Simonsen2012 - Sustained Participatory Design.pdf -> .git/annex/objects/pq/4j/SHA256E-s618220--872437b205026a1b5f0fa1153390013352831fa2ec2c183201e4a8d42b203dc5.pdf/SHA256E-s618220--872437b205026a1b5f0fa1153390013352831fa2ec2c183201e4a8d42b203dc5.pdf196logplain
l---------Springer2014IPMU - Information Processing and Management of Uncertainty in Knowledge Based Systems_ 15th International Conference, IPMU 2014, Montpellier, France, July 15 19, 2014, Proceedings, Part III.pdf -> .git/annex/objects/3F/mG/SHA256E-s15725858--363a15f2e865f9ba21c6ecdab8d0580de681751980088d82aaedbc02b6a7897e.pdf/SHA256E-s15725858--363a15f2e865f9ba21c6ecdab8d0580de681751980088d82aaedbc02b6a7897e.pdf200logplain
l---------Springer2017ESWCremote -.pdf -> .git/annex/objects/zj/8M/SHA256E-s35584153--502957806e43e6830e5b0dcd5a83ef475b3bcab0c6b3e3c2e8d2db89045127a1.pdf/SHA256E-s35584153--502957806e43e6830e5b0dcd5a83ef475b3bcab0c6b3e3c2e8d2db89045127a1.pdf200logplain
l---------Springer2021ISWC -.pdf -> .git/annex/objects/VW/x3/SHA256E-s527994--7c4537a91af356b6440edecee6d9f8d5102ad8f251a506b09f7946bd52264d3f.pdf/SHA256E-s527994--7c4537a91af356b6440edecee6d9f8d5102ad8f251a506b09f7946bd52264d3f.pdf196logplain
l---------Springer2022ESWC -.pdf -> .git/annex/objects/Wk/0G/SHA256E-s42603765--3f0cefe7a069e3ffe3e2bd35180ff4489d6533ee3060f5fd5e4825f4201aa0d7.pdf/SHA256E-s42603765--3f0cefe7a069e3ffe3e2bd35180ff4489d6533ee3060f5fd5e4825f4201aa0d7.pdf200logplain
l---------Springer2023CITI -.pdf -> .git/annex/objects/9Z/p3/SHA256E-s28869879--8d92d81b82f15486fd550100ee52be3e9673f18b37aa3253d5a68e009fea1181.pdf/SHA256E-s28869879--8d92d81b82f15486fd550100ee52be3e9673f18b37aa3253d5a68e009fea1181.pdf200logplain
l---------Springer2023ESWC -.pdf -> .git/annex/objects/5K/7q/SHA256E-s40878725--4b6d5a2357d29bd0acc22e7d5ff7559f760802810b6e67c76aa3c93bb71776bb.pdf/SHA256E-s40878725--4b6d5a2357d29bd0acc22e7d5ff7559f760802810b6e67c76aa3c93bb71776bb.pdf200logplain
l---------Springer2023ITAF -.pdf -> .git/annex/objects/W1/Mm/SHA256E-s9998558--c5fe3ae44a88942d68d5f6de8cac279a8e7ef029f4251a2f4f72b94f2cb29c9e.pdf/SHA256E-s9998558--c5fe3ae44a88942d68d5f6de8cac279a8e7ef029f4251a2f4f72b94f2cb29c9e.pdf198logplain
l---------Stanford2021 - Liberatory Design.pdf -> .git/annex/objects/xK/k6/SHA256E-s3753088--04fbb9c7588cf9925f843230d12d4971b684886453e0222e9be266fe7e2c5bfd.pdf/SHA256E-s3753088--04fbb9c7588cf9925f843230d12d4971b684886453e0222e9be266fe7e2c5bfd.pdf198logplain
l---------Venable2016 - FEDS.pdf -> .git/annex/objects/93/KF/SHA256E-s235964--186876c203feae8ec250d5014de998a94120b9a41334117735c772ef1fe362ee.pdf/SHA256E-s235964--186876c203feae8ec250d5014de998a94120b9a41334117735c772ef1fe362ee.pdf196logplain
l---------Wylie2018 - Chapter 3. Cognitive Processes and Digital Reading.pdf -> .git/annex/objects/Qm/7z/SHA256E-s360156--7eaa7ee51648668d0dcb5e535647cc13726ebb3122a98c765326530dfa4ff4a8.pdf/SHA256E-s360156--7eaa7ee51648668d0dcb5e535647cc13726ebb3122a98c765326530dfa4ff4a8.pdf196logplain
l---------Zuboff2019 - The Age of Surveillance Capitalism.pdf -> .git/annex/objects/9j/xz/SHA256E-s336965--ad673a2ded5408b74696951425400feefd3279854d28f76df5f405651820fbca.pdf/SHA256E-s336965--ad673a2ded5408b74696951425400feefd3279854d28f76df5f405651820fbca.pdf196logplain
l---------the-sage-handbook-of-social-media.pdf -> .git/annex/objects/7V/2v/SHA256E-s266570--efce22c2916449c4fdb2a4743664b33b56992a3d5c7653e6dcdec964cf68c2cd.pdf/SHA256E-s266570--efce22c2916449c4fdb2a4743664b33b56992a3d5c7653e6dcdec964cf68c2cd.pdf196logplain