Lineage stores often contain sensitive information that needs protection from unauthorized access. We build on prior work for security and privacy of lineage information, focusing...
Arnon Rosenthal, Len Seligman, Adriane Chapman, Ba...
Although clinic environments are a primary location for exchanging information with clinicians, patients experience these spaces as harsh environments to access, use, exchange, an...
Kenton T. Unruh, Meredith M. Skeels, Andrea Civan-...
In order to support co-located collaboration, many researchers are now investigating how to effectively augment tabletops with electronic displays. As far back as 1988, orientatio...
Russell Kruger, M. Sheelagh T. Carpendale, Stacey ...
Information hiding is one of the most important and influential principles in software engineering. It prescribes that software modules hide implementation details from other modu...
Cleidson R. B. de Souza, David F. Redmiles, Li-Te ...
Abstract - Understanding the appropriation of CSCW-Tools is key to their successful implementation. This paper explores the social and organizational appropriation of the Cuparla C...