Abstract: Field studies and user requirements analysis are highly valued practices in the human-computer interaction community. However, in companies, field study methods are not w...
Sari Kujala, Marjo Kauppinen, Pia Nakari, Sanna Re...
The Tit-for-Tat strategy implemented in BitTorrent (BT) clients is generally considered robust to selfish behaviours. The authors of [1] support this belief studying how Tit-for-T...
Giovanni Neglia, Giuseppe Lo Presti, Honggang Zhan...
The incorporation of exception handling strategies in mobile collaborative applications bring several challenges to middleware designers due to their intrinsic characteristics of ...
This paper reports a study of Personal Information Management (PIM), which advances research in two ways: (1) rather than focusing on one tool, we collected cross-tool data relati...
we propose a repository to characterize OO evolution problematic. The two main objectives are to characterize object evolution according to its own features, and to uniformly analy...