Sciweavers

2648 search results - page 278 / 530
» Human Factors In Computer Security
Sort
View
119
Voted
PERSUASIVE
2009
Springer
15 years 10 months ago
Designing games to motivate physical activity
Engagement with computer games causes children and adolescent users to spend a substantial amount of time at sedentary game playing activity. We hypothesise that this engagement c...
Shlomo Berkovsky, Dipak Bhandari, Stephen Kimani, ...
106
Voted
ATAL
2007
Springer
15 years 10 months ago
An agent-based methodology for analyzing and visualizing educational assessment data
We examine data collected from on-line assessments of the numeracy and literacy skills of young students in order to construct probabilistic agent-based controllers. We demonstrat...
Elizabeth Sklar, Jordan Salvit, Christopher Camach...
123
Voted
IUI
2006
ACM
15 years 9 months ago
Eye-tracking to model and adapt to user meta-cognition in intelligent learning environments
In this paper we describe research on using eye-tracking data for on-line assessment of user meta-cognitive behavior during the interaction with an intelligent learning environmen...
Christina Merten, Cristina Conati
ACMSE
2005
ACM
15 years 9 months ago
Acquiring and delivering lessons learned for NASA scientists and engineers: a dynamic approach
Web forms are a common mechanism for collecting information online. They pose some limitations which negatively affect ease and flexibility of user interaction. These limitations ...
Swapna Gupta, J. Scott Hawker, Randy K. Smith
GROUP
2005
ACM
15 years 9 months ago
Pair programming and the re-appropriation of individual tools for collaborative programming
Although pair programming is becoming more prevalent in software development, and a number of reports have been written about it [4] [6], few have addressed the manner in which pa...
Sallyann Bryant, Pablo Romero, Benedict du Boulay