Usability is the weakest link in the security chain of many prominent applications. A set of security usability principles should therefore be considered when designing and engine...
This paper introduces the use of speech translation technology for a new type of voice-interactive Computer Aided Language Learning (CALL) application. We describe a computer game...
Notwithstanding all the technology being invested in education, students still have to cope with a massive input of instructional information. Howeve...
Carlo E. T. de Oliveira, Livia M. Castro, Luiz G. ...
The Second Instructional Technology in Education Study: Module 2 (SITES M2) is a series of qualitative studies that identify and describe innovative pedagogical practices in 28 par...