Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
In today's society, people have very little control over what kinds of personal data are collected and stored by various agencies in both the private and public sectors. We de...
This paper describes a model-based approach for designing distributed user interfaces (DUIs), i.e. graphical user interfaces that are distributed along one or many of the followin...
We discuss the problem of assessing and aiding user performance in dynamic tasks that require rapid selection among multiple information sources. Motivated by research in human se...
Bradley C. Love, Matt Jones, Marc T. Tomlinson, Mi...
Assistance – work carried out by one entity in support of another – is a concept of long-standing interest, both as a type of human work common in organizations and as a model...
Thomas Erickson, Catalina M. Danis, Wendy A. Kello...