Designers generally agree that understanding the context of use is important in designing products. However, technologically advanced products such as personal robots engender com...
Phishing, e-mails sent out by hackers to lure unsuspecting victims into giving up confidential information, has been the cause of countless security breaches and has experienced i...
This paper describes a discussion-bot that provides answers to students’ discussion board questions in an unobtrusive and humanlike way. Using information retrieval and natural ...
Donghui Feng, Erin Shaw, Jihie Kim, Eduard H. Hovy
Measurements of the impact and history of research literature provide a useful complement to scientific digital library collections. Bibliometric indicators have been extensively...
Instead of the reality in which you can see your own limbs, in virtual reality simulations it is sometimes disturbing not to be able to see your own body. It seems to create an is...