—Social Networks will unfold their full potential when connected people are enabled to collaborate - any time, appropriate to the current location, activity and computing environ...
Daniel Schuster, Thomas Springer, Alexander Schill
This study investigates the context of interactions of IT security practitioners, based on a qualitative analysis of 30 interviews and participatory observation. We identify nine ...
Rodrigo Werlinger, Kirstie Hawkey, Konstantin Bezn...
Visual schedules—the use of symbols to represent a series of activities or steps—have been successfully used by caregivers to help children with autism to understand, structur...
Sen H. Hirano, Michael T. Yeganyan, Gabriela Marcu...
We implemented a five-week family program called Family Quest where parents and children ages 9 to 13 played Quest Atlantis, a multiuser 3D educational computer game, at a local af...
Sinem Siyahhan, Sasha A. Barab, Michael P. Downton
We consider in this paper a popular class of recommender systems that are based on Collaborative Filtering (CF for short). CF is the process of predicting customer ratings to item...