{"title":"Collaborative virtual environments for supporting learning communities: an experience of use[7] (abstract only)","authors":"E. Prasolova-Førland, M. Divitini","doi":"10.1145/1027232.1027243","DOIUrl":"https://doi.org/10.1145/1027232.1027243","url":null,"abstract":"In this paper we present the experiences of usage of Viras, a collaborative virtual environment for social awareness support in educational settings. Collaborative Virtual environments (CVE) have lately been used for learning in different contexts, and offer promising possibilities for supporting social awareness. In our study, we look at how students evaluate CVE in educational settings and investigate the importance of different factors on social awareness.","PeriodicalId":390207,"journal":{"name":"ACM Siggroup Bulletin","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114363545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using cursor prediction to smooth telepointer jitter[33] (abstract only)","authors":"C. Gutwin, Jeff Dyck, J. Burkitt","doi":"10.1145/1027232.1027280","DOIUrl":"https://doi.org/10.1145/1027232.1027280","url":null,"abstract":"Telepointers are an important type of embodiment in real-time distributed groupware. Telepointers can increase the presence of remote participants and can provide considerable awareness information about people's locations and activities. However, the motion of a telepointer is often disrupted by network jitter. Although some strategies exist for dealing with jitter, none of these techniques are able to restore the immediacy and smoothness of a real cursor. In this paper we investigate the use of prediction - commonly used in networked simulations and games - to reduce the effects of jitter on telepointer motion. To determine whether prediction can be effective for improving telepointers, we carried out two experiments that tested the effects of different prediction schemes (some real and some artificial) on people's ability to interpret telepointer gestures. These studies show that although cursor prediction is still a difficult problem. there are both potential performance improvements, and definite preference advantages. Our studies suggest that telepointer prediction should be routinely used to increase the immediacy and naturalness of remote interaction, and suggest that prediction can also improve interpretation in certain situations.","PeriodicalId":390207,"journal":{"name":"ACM Siggroup Bulletin","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114163726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ordering systems: coordinative practices in architectural design and planning[31] (abstract only)","authors":"K. Schmidt","doi":"10.1145/1027232.1027277","DOIUrl":"https://doi.org/10.1145/1027232.1027277","url":null,"abstract":"In their cooperative effort, architects depend critically on elaborate coordinative practices and artifacts. The paper presents, on the basis of an in-depth study of architectural work, an analysis of these practices and artifacts and shows that they are multilaterally interrelated and form complexes of interrelated practices and artifacts which we have dubbed 'ordering systems'. In doing so, the paper outlines a conceptual framework for investigating and conceiving of such practices.","PeriodicalId":390207,"journal":{"name":"ACM Siggroup Bulletin","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122526212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Owner/user role in computational grid extension by non-dedicated resources[25] (abstract only)","authors":"G. Martinović","doi":"10.1145/1027232.1027268","DOIUrl":"https://doi.org/10.1145/1027232.1027268","url":null,"abstract":"Engagement of non-dedicated machines in the computational grid requires special attention by mapping. In addition to application, platform and mapping parameters, a human as a resource owner plays an extremely important role. The problem is easier for the owner/user who also requires grid services at the same time. The grid can provide a powerful support to CSCW. Resource concession can also be treated as cooperation in the grid extension. The proposed resource extension model is based on meeting scheduling. This model puts a group member into a competitive position, since he becomes responsible for his organizational and infrastructure capabilities. He tends to concede the idle capacity to the grid in order to be able to use services provided by that powerful virtual machine.","PeriodicalId":390207,"journal":{"name":"ACM Siggroup Bulletin","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116869025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The evolution of artifacts in cooperative work: constructing meaning through activity[16] (abstract only)","authors":"Marlin M. Cluts","doi":"10.1145/1027232.1027256","DOIUrl":"https://doi.org/10.1145/1027232.1027256","url":null,"abstract":"A two year case study of cooperative work was inspired by the installation of CSCW software in a community bank. The framework for the research was developed by combining activity theory and the principles of communities of practice. This framework provided a useful model and insight into the evolution of artifact meaning, sharing, and credibility. In essence, users needed to experience results within the activity system and social structure of the community to establish meaning and credibility. The study applied the theory and language of activity theory and communities of practice to make sense of case phenomena and provide a richer context for understanding traditional principles.","PeriodicalId":390207,"journal":{"name":"ACM Siggroup Bulletin","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116321088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Group unified histories an instrument for productive unconstrained co-browsing[37] (abstract only)","authors":"Maria Aneiros, V. Estivill-Castro, Chengzheng Sun","doi":"10.1145/1027232.1027286","DOIUrl":"https://doi.org/10.1145/1027232.1027286","url":null,"abstract":"The most common task being performed on the World Wide Web, namely exploring its contents remains an individual rather than a cooperative, shared or partnered activity. We propose that the existing model of collaborative browsing, namely master/slave, is too restrictive. Instead, we introduce group unified histories to provide unconstrained cooperative browsing. Our approach is founded on a persistent shared history object which is replicated for each user and totally configurable. In order for cooperation to succeed users are updated of changes taking place and shown the history of documents within the context of the group. Replication means that consistency needs to be maintained. We show that unconstrained cooperative browsing is a subset of collaborative editing, and using the consistency model of real-time collaborative editors achieves consistency and provides awareness in group unified histories.","PeriodicalId":390207,"journal":{"name":"ACM Siggroup Bulletin","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133213926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Motorcycling and social interaction: design for the enjoyment of brief traffic encounters[10] (abstract only)","authors":"M. Esbjörnsson, O. Juhlin, Mattias Östergen","doi":"10.1145/1027232.1027247","DOIUrl":"https://doi.org/10.1145/1027232.1027247","url":null,"abstract":"We report an ethnographic fieldwork that reveals the importance of social interaction, and especially traffic encounters, for the enjoyment of motorcycling. Motorcyclists spend an appreciable amount of time on the roads to meet other bikers. During the brief traffic encounters, they interact visually by means of their driving, their choice of bike and personal equipment. We uncover problematic issues in this practice and how these are currently addressed. The activities on the roads are partly arranged, and partly complemented by the use of a public message-board on the web. The findings are summarized as a set of implications informing the development of the Hocman prototype. Hocman is a mobile HTTP peer-to-peer application, which supports social interaction between motorcyclists.","PeriodicalId":390207,"journal":{"name":"ACM Siggroup Bulletin","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130409241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Managing virtual knowledge networks: topology and performance[22] (abstract only)","authors":"Gregor Schrott, D. Beimborn","doi":"10.1145/1027232.1027264","DOIUrl":"https://doi.org/10.1145/1027232.1027264","url":null,"abstract":"Virtual informal communication networks are widely recognized as an important part of corporate knowledge management (KM). Unfortunately, most practices of community-engineering are characterized by intuitive actions from KM managers rather than systematic network development based on detailed analysis. Therefore, as part of a larger research framework, this paper addresses topological structures as action variable of community-engineering. A dynamic computer-based simulation model is introduced and applied to real-life data from over 800 students and staff of the Economics and Business Administration Department at Frankfurt University, Germany. Several metrics of networks performance are developed and illustrated using different exemplary actions of community-engineering.","PeriodicalId":390207,"journal":{"name":"ACM Siggroup Bulletin","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124521643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"\"Breaking the code\", moving between private and public work in collaborative software development[12] (abstract only)","authors":"Cleidson De Souza, D. Redmiles, P. Dourish","doi":"10.1145/1027232.1027250","DOIUrl":"https://doi.org/10.1145/1027232.1027250","url":null,"abstract":"Software development is typically cooperative endeavor where a group of engineers need to work together to achieve a common, coordinated result. As a cooperative effort, it is especially difficult because of the many interdependencies amongst the artifacts created during the process. This has lead software engineers to create tools, such as configuration management tools, that isolate developers from the effects of each other's work. In so doing, these tools create a distinction between private and public aspects of work of the developer. Technical support is provided to these aspects as well as for transitions between them. However, we present empirical material collected from a software development team that suggests that the transition from private to public work needs to be more carefully handled. Indeed, the analysis of our material suggests that different formal and informal work practices are adopted by the developers to allow a delicate transition, where software developers are not largely affected by the emergent public work. Finally, we discuss how groupware tools might support this transition.","PeriodicalId":390207,"journal":{"name":"ACM Siggroup Bulletin","volume":"24 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125671951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Process inheritance and instance modification[26] (abstract only)","authors":"Guangxin Yang","doi":"10.1145/1027232.1027269","DOIUrl":"https://doi.org/10.1145/1027232.1027269","url":null,"abstract":"Process technologies play an increasingly important role as the world is being digitalized in nearly every corner. The major obstacles to their massive deployment include reusability and adaptivity. This paper addresses the two crucial problems with one single solution: process inheritance. We discuss what process inheritance is, what mechanisms are needed to support it, and how it can be used to handle exceptions effectively. The ideas and mechanisms are implemented in the runtime system of a process language named P.","PeriodicalId":390207,"journal":{"name":"ACM Siggroup Bulletin","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133616161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}