Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
As wireless devices become more pervasive, mobile ad hoc networks are gaining importance, motivating the development of highly scalable ad hoc networking techniques. In this paper...
Shu Du, Ahamed Khan, Santashil PalChaudhuri, Ansle...
The changes in the dynamics of the economy and the corresponding mobility and fluctuations of knowledge workers within organizations make continuous social learning an essential f...
Karin Schoefegger, Nicolas Weber, Stefanie N. Lind...
Web-based collaboration systems typically require dynamic and context-based interactions between people and services. To support such complex interaction scenarios, we introduce a...
Historically, the dominant paradigm in HCI, when it appeared as a field in early 80s, was information processing ("cognitivist") psychology. In recent decades, as the fo...
Bonnie A. Nardi, Edwin Hutchins, James D. Hollan, ...