In this paper, we show how traditional physical interface components such as switches, levers, knobs and touch screens can be easily modified to identify who is activating each co...
Paul H. Dietz, Bret Harsham, Clifton Forlines, Dar...
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
In this paper we discuss potential developments to the design of pre-trip in-home journey planning services, to include support for additional user needs. These needs were identif...
Alisdair Owens, Daniel A. Smith, Max Wilson, Paul ...
Application autonomy can reduce interactions with users, ease the use of the system, and decrease user distraction. On the other hand, users may feel loss of control over their ap...
This demonstration will illustrate the key technical and user interface aspects of the Web Adaptation Technology. Various transformations underlying the system will be shown that ...