Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Research was conducted on using agile methods in software engineering education. This paper explores the perceptions of students from five different academic levels of agile pract...
How much help helps in discovery learning? This question is one instance of the assistance dilemma, an important issue in the learning sciences and educational technology research....
Alexander Borek, Bruce M. McLaren, Michael Karabin...
This study extends the theory of Recognition Primed Decision-Making by applying it to groups. Furthermore, we explore the application of Template Theory to collaboration. An exper...
Stephen C. Hayne, C. A. P. Smith, Leo R. Vijayasar...
Video game players often learn to map their physical actions (e.g., pressing buttons) onto their on-screen avatars' actions (e.g., wielding swords) in order to play. We explo...