s of titles and abstracts) as irrelevant to our focus. We read the remaining 519 papers in full to establish our final list. The 92 papers we chose were originally published in the...
Tracy Hall, Helen Sharp, Sarah Beecham, Nathan Bad...
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...
If complexity is a necessary but not sufficient premise for the existence and expression of the living, anticipation is the distinguishing characteristic of what is alive. Anticipa...
Annotation plays a major role in a user’s reading of a document: from elementary school students making notes on text books to professors marking up their latest research papers....
Jennifer Pearson, George Buchanan, Harold W. Thimb...
The increasing use of multimedia in education makes text-production with computers important for students. What kind of role does the Internet play here as an external source of i...