Abstract. The Internet has instigated a critical need for automated tools that facilitate integrating countless databases. Since non-technical end users are often the ultimate repo...
Users gain access to cash, confidential information and services at Automated Teller Machines (ATMs) via an authentication process involving a Personal Identification Number (PIN)...
Virtual agents designed to establish relationships with more than one user must be able to identify and distinguish among those users with high reliability. We descr...
Daniel Schulman, Mayur Sharma, Timothy W. Bickmore
Most e-learning environments which utilize user feedback or profiles, collect such information based on questionnaires, resulting very often in incomplete answers, and sometimes de...
Different kinds of computing environment effect human interaction in different kinds of ways and understanding how different environments ‘work’, as it were, is important to t...