Attentive systems pay attention to what users do so that they can attend to what users need. Such systems track user behavior, model user interests, and anticipate user desires an...
Paul P. Maglio, Rob Barrett, Christopher S. Campbe...
Many tasks require users to extract information from diverse sources, to edit or process this information locally, and to explore how the end results are affected by changes in th...
Web spam is a widely-recognized threat to the quality and security of the Web. Web spam pages pollute search engine indexes, burden Web crawlers and Web mining services, and expos...
Internet users today who subscribe to many different accounts or subscriptions online face a bewildering array of logins and passwords to remember on security systems where usabil...
The growing number of mobile computing devices with diverse characteristics creates a requirement for seamless (device independent) access to computing resources of distributed sy...