Authentication in public spaces is a risky task. Frauds on cash machines (ATMs) are not uncommon nowadays. The biggest group of attacks is observation attacks, which focus on reco...
Alexander De Luca, Emanuel von Zezschwitz, Heinric...
A method of using string-matching to analyze hypertext navigation was developed, and evaluated using two weeks of website logfile data. The method is divided into phases that use:...
The Sensorium family of games provides a platform and environment for multiplayer games in a pervasive environment. Each player is equipped with a mote, which (along with those of...
Notification interfaces that continuously present peripheral information have received increasing interest within the HCI community, especially those supporting awareness of other...
John E. Booker, Christa M. Chewar, D. Scott McCric...
Based on qualitative analysis of three groups collaborating on a research task in a distributed setting, we identify four breakdowns in creativity: (1) Minority ideas were under-c...