Software can now track which computer applications and documents you use. This provides us with the potential to help end-users recall past activities for tasks such as status rep...
A. J. Bernheim Brush, Brian Meyers, Desney S. Tan,...
: This paper begins with a long-term view of the development of cyberspace. This includes a brief examination of the worldview of a 16th-century mapmaker and over 4000 years of dev...
This paper describes a behavioural model used to simulate realistic eye-gaze behaviour and body animations for avatars representing participants in a shared immersive virtual envi...
Vinoba Vinayagamoorthy, Maia Garau, Anthony Steed,...
Through a study of web site design practice, we observed that web site designers design sites at different levels of refinement—site map, storyboard, and individual page— and ...
James Lin, Mark W. Newman, Jason I. Hong, James A....
Current systems for banking authentication require that customers not reveal their access codes, even to members of the family. A study of banking and security in Australia shows ...