Tutorial dialogue has been the subject of increasing attention in recent years, and it has become evident that empirical studies of humanhuman tutorial dialogue can contribute impo...
Kristy Elizabeth Boyer, Mladen A. Vouk, James C. L...
Distributed network intrusion detection systems which incorporate tens, hundreds, even thousands, of sensors are becoming increasing popular. Managing and presenting the informati...
John C. McEachen, Cheng Kah Wai, Vonda L. Olsavsky
The proliferation of cell phones has led to an ever increasing number of inappropriate interruptions. Context-aware telephony applications, in which callers are provided with cont...
All Information Technology (IT) systems have architecture and these architectures are developed by people, frequently called IT architects. These people vary in their capabilities...
Keith Frampton, James A. Thom, Jennie Carroll, Bru...
This paper reports on a study which compared two tools for tracking the focus of visual attention - a remote eye tracker and the Restricted Focus Viewer (RFV). The RFV tool blurs ...