Authentication in public spaces poses significant security risks. Most significantly, passwords can be stolen, potentially leading to fraud. A common method to steal a PIN is thro...
In this paper we discuss a screening process used in conjunction with a survey administered via Amazon.com’s Mechanical Turk. We sought an easily implementable method to disqual...
Julie S. Downs, Mandy B. Holbrook, Steve Sheng, Lo...
Interpreting compiler errors and exception messages is challenging for novice programmers. Presenting examples of how other programmers have corrected similar errors may help novi...
More and more web users keep up with newest information through information streams such as the popular microblogging website Twitter. In this paper we studied content recommendat...
Jilin Chen, Rowan Nairn, Les Nelson, Michael Berns...
The ready availability of online source code examples has changed the cost structure of programming by example modification. However, current search tools are wholly separate from...
Joel Brandt, Mira Dontcheva, Marcos Weskamp, Scott...