Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
Graphs provide good representations for many domains. Interactive graph-based interfaces are desireable to browse and edit data for these domains. However, as graphs increase in s...
The idea of interactional trajectories through interfaces has emerged as a sensitizing concept from recent studies of tangible interfaces and interaction in museums and galleries....
Steve Benford, Gabriella Giannachi, Boriana Koleva...
We describe a code reuse tool for use in the Looking Glass IDE, the successor to Storytelling Alice [17], which enables middle school students with little to no programming experi...
Paul A. Gross, Micah S. Herstand, Jordana W. Hodge...
: The studies on user and mobile phone interaction have been an important problem in small screen interface design. The present study was intend to investigate the impact of three ...
Xuemin Zhang, Wen Shan, Qin Xu, Bin Yang, Yun-Feng...