In this paper, by exploiting the log of call detail records, we present a solution procedure of mining user moving patterns in a mobile computing system. Specifically, we propose ...
With the rapid growth of personal computer networks and the Internet, sharing files has become a central activity in computer use. The ways in which users control the what, how, a...
Stephen Voida, W. Keith Edwards, Mark W. Newman, R...
We present work that explores whether the asynchronous peer-topeer communication capabilities of email can be made accessible to illiterate populations in the developing world. Bu...
How can we best explore the range of users' reactions when developing future technologies that maybe controversial, such as personal healthcare systems? Our approach – Cont...
Clara Mancini, Yvonne Rogers, Arosha K. Bandara, T...
Many activities on the web are driven by high-level goals of users, such as “plan a trip” or “buy some product”. In this paper, we are interested in exploring the role and ...
Markus Strohmaier, Mathias Lux, Michael Granitzer,...