We investigate the effect of search engine brand (i.e., the identifying name or logo that distinguishes a product from its competitors) on evaluation of system performance. This r...
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
Measuring user acceptance to avoid system rejection by the users in pre-prototype stage of product development is of high interest for both researchers and practitioners. This is ...
Alexander Meschtscherjakov, David Wilfinger, Thoma...
Our research aims at interactive document viewers that can select and highlight relevant text passages on demand. Another related objective is the generation of topic-specific su...
Reverse Turing tests, or CAPTCHAs, have become an ubiquitous defense used to protect open Web resources from being exploited at scale. An effective CAPTCHA resists existing mechan...
Marti Motoyama, Kirill Levchenko, Chris Kanich, Da...