People with chronic health problems use online resources to understand and manage their condition, but many such resources can present competing and confusing viewpoints. We surve...
Jennifer Mankoff, Kateryna Kuksenok, Sara B. Kiesl...
Phishers are fraudsters that mimic legitimate websites to steal user’s credential information and exploit that information for identity theft and other criminal activities. Vari...
Eric Lin, Saul Greenberg, Eileah Trotter, David Ma...
Conversing on cell phones while driving is a risky, yet commonplace activity. State legislatures in the U.S. have enacted rules that limit hand-held phone conversations while driv...
Shamsi T. Iqbal, Eric Horvitz, Yun-Cheng Ju, Ella ...
There is a wealth of theoretical knowledge about the developmental abilities and skills of children. However, this knowledge is not readily accessible to designers of interactive ...
The paper presents an approach to the task of automatic document categorization in the field of economics. Since the documents can be annotated with multiple keywords (labels), we ...