To better serve users’ information needs without requiring comprehensive queries from users, a simple yet effective technique is to explore the preferences of users. Since these...
Arthur H. van Bunningen, Maarten M. Fokkinga, Pete...
A masquerade attack, in which one user impersonates another, is among the most serious forms of computer abuse, largely because such attacks are often mounted by insiders, and can...
: Reactive Information Displays (RIDs) that track and react to a user’s attention, to present the right information at the right place and in the right time, constitute a relativ...
The management of groups is an essential task in collaborative learning scenarios. In a blended learning situation, in which online activities and face-to-face activities are comb...
—Education of design engineering has started to change in response to the advancement of computer technology. This paper proposes a new design engineering educational framework u...