Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...
As services embedded into public spaces become increasingly transparent, one peripheral aspect of use continues to demand explicit user attention: payment. UbiPay is a system that...
In this paper, we discuss a method and the associated tool support able to exploit Web services in model-based user interface development, starting with the results of a task anal...
We present an empirical study of the effect of a computer agent designed to engage a user in a persuasive counseling dialogue on attitudes towards regular exercise. We used two ma...
In this paper, we report a study that examines the relationship between image-based computational analyses of web pages and users’ aesthetic judgments about the same image mater...
Xianjun Sam Zheng, Ishani Chakraborty, James Jeng-...