Programming courses of all levels rely heavily on code examples. Often, to cover non-trivial subjects, it is convenient to present examples in the form of a tutorial. Such tutoria...
Chris Kojouharov, Aleksey Solodovnik, Gleb Naumovi...
To compare the outcomes of participatory and user-centered contextual design, case study methods and the Activity Checklist derived from Activity Theory are used to analyze two sy...
Cryptographic methods are widely used within networking and digital rights management. Numerous algorithms exist, e.g. spanning VPNs or distributing sensitive data over a shared ne...
Although graphical user interfaces started as imitations of the physical world, many interaction techniques have since been invented that are not available in the real world. This...
Jun Rekimoto, Takaaki Ishizawa, Carsten Schwesig, ...
Open systems are characterized by heterogeneous participants which can enter or leave the system at will. Typical examples are e-commerce applications or information agent systems...