This paper examines the lexical entrainment of real users in the Let's Go spoken dialog system. First it presents a study of the presence of entrainment in a year of human-tr...
Text-based passwords are still the most commonly used authentication mechanism in information systems. We took advantage of a unique opportunity presented by a significant change...
Richard Shay, Saranga Komanduri, Patrick Gage Kell...
Users need to be strongly involved in the specification process of network information systems. Characteristics of user-driven specification are described, and process composition ...
Abstract: With new techniques, such as Microformats or RDFa, for integrating semantics into existing web formats, we expect a strong increase of semantically annotated documents in...
Phishing, e-mails sent out by hackers to lure unsuspecting victims into giving up confidential information, has been the cause of countless security breaches and has experienced i...