User-centered security has been identified as a grand challenge in information security and assurance. It is on the brink of becoming an established subdomain of both security and...
The authors’ aim in this work is to develop an easy-to-use computer-human interaction (CHI) platform. In this paper, i-ball 2 (interactive/information ball 2) is introduced as a...
We present the results of using Hidden Markov Models (HMMs) for automatic segmentation and recognition of user motions. Previous work on recognition of user intent with man/machin...
C. Sean Hundtofte, Gregory D. Hager, Allison M. Ok...
Enterprise Resource Planning (ERP) systems have become essential in industry, yet the potential value created through system use can be illusive due to poor usability. Extensive in...
Tamara Babaian, Wendy T. Lucas, Jennifer Xu, Heikk...
As computing migrates from the workplace to the home, householders must tackle problems of home network maintenance. Often they lack the technical knowledge or motivation to compl...
Erika Shehan Poole, Marshini Chetty, Rebecca E. Gr...