In this paper we discuss and demonstrate how traditional literature reviews may be enriched by computer-assisted research profiling. Research profiling makes use of sophisticated ...
Johanna Bragge, Sami Relander, Anne Sunikka, Petri...
Locating physical devices and accessing their functionality in pervasive environments is strongly restricted by their locality. Since there are more and more devices available, wa...
In a world where intelligence can be arguably measured by an animal’s ability to use tools, are we marking ourselves for natural selection? Software development tools are steadi...
For the past fifty years, the idea generation literature has been plagued by inconsistent findings concerning how best to achieve certain group outcomes. It is proposed that these...
The interest in pair programming (PP) has increased recently, e.g. by the popularization of agile software development. However, many practicalities of PP are poorly understood. W...
The derivation of specific models from reference models corresponds with the creation of reference model variants. Research on the design of such variant constructions generally a...
Wikipedia, the online encyclopedia, has attracted attention both because of its popularity and its unconventional policy of letting anyone on the internet edit its articles. This ...
Critical infrastructures display many of the characteristic properties of complex systems. They exhibit infrequent large failures events that often obey a power law distribution i...
Benjamin A. Carreras, David E. Newman, Paul Gradne...
This article presents results from a small-scale pilot study investigating linguistic production and structural patterns while multitasking and interrelating these findings with c...
Computer forensics is a relatively new, but growing, field of study at the undergraduate college and university level. This paper describes some of the course design aspects of te...