This paper examines the way in which a knowledge management system (KMS)—by which we mean the people, processes and software—came into being and evolved in response to a varie...
Christine Halverson, Thomas Erickson, Mark S. Acke...
Tabletop displays provide exciting opportunities to support individual and collaborative activities such as planning, organizing, and storyboarding. It has been previously suggest...
Uta Hinrichs, M. Sheelagh T. Carpendale, Stacey D....
Telecenters, libraries and internet cafés are often credited as being important venues for making information and communication technologies (ICTs) more widely available for peop...
Several new approaches for detecting malicious attacks on computer systems and/or confining untrusted or malicious applications have emerged over the past several years. These tec...
User authentication, which refers to the process of verifying the identity of a user, is becoming an important security requirement in various embedded systems. While conventional...