This paper examines the relationship between gestures' function and form in design collaboration. It adopts a cognitive design research viewpoint. The analysis is restricted t...
The costs of data loss and unavailability can be large, so businesses use many data protection techniques, such as remote mirroring, snapshots and backups, to guard against failur...
Shravan Gaonkar, Kimberly Keeton, Arif Merchant, W...
Cognitive impairments play a large role in the lives of surviviors of mild traumatic brain injuries who are unable to return to their prior level of independence in their homes. C...
Jessica Paradise, Elizabeth D. Mynatt, Cliff Willi...
—The purpose of secure devices such as smartcards is to protect secret information against software and hardware attacks. Implementation of the appropriate protection techniques ...
Ashur Rafiev, Julian P. Murphy, Alexandre Yakovlev
Abstract. Engaging end-users and user communities to take an active part in the cocreation, evolution, and appropriation of modern, interactive systems has become an increasingly i...
Steffen Budweg, Sebastian Draxler, Steffen Lohmann...