This paper reports on an exploratory study of the effects of input configuration on group behavior and performance in a collaborative task performed by a collocated group using a ...
Jeremy P. Birnholtz, Tovi Grossman, Clarissa Mak, ...
Abstract— Converting a secure group key agreement protocol into password-based setting is not a trivial task. The security of a password-based scheme hinges on preventing diction...
International and intercultural collaborations provide a unique opportunity to explore cultural differences in the usage and appropriation of a technology. Mobile photo capture an...
Nirmal J. Patel, James Clawson, Namwook Kang, Seun...
Code Cloning is regarded as a threat to software maintenance, because it is generally assumed that a change to a code clone usually has to be applied to the other clones of the cl...
Multi-subject analysis of functional Magnetic Resonance Imaging (fMRI) data relies on within-subject studies, which are usually conducted using a massively univariate approach. In...
Philippe Ciuciu, Thomas Vincent, Anne-Laure Fouque...