03-21-2019
|
From Cyber-Security Deception To Manipulation and
Gratification Through Gamification
by
Xavier Bellekens
et al
|
03-20-2019
|
Gamification Techniques for Raising Cyber Security
Awareness
by
Sam Scholefield
et al
|
03-21-2019
|
Characterizing HCI Research in China: Streams,
Methodologies and Future Directions
by
Tao Bi
et al
|
03-19-2019
|
Cross-study Reliability of the Open Card Sorting Method
by
Christos Katsanos
et al
|
03-21-2019
|
Learning Personalized Thermal Preferences via Bayesian
Active Learning with Unimodality Constraints
by
Nimish Awalgaonkar
et al
|
03-21-2019
|
Exploratory studies of human gait changes using depth
cameras and considering measurement errors
by
Behnam Malmir
|
03-20-2019
|
EHAAS: Energy Harvesters As A Sensor for Place
Recognition on Wearables
by
Yoshinori Umetsu
et al
|
03-22-2019
|
The Perfect One: Understanding Communication Practices
and Challenges with Animated GIFs
by
Jialun "Aaron" Jiang
et al
|
03-22-2019
|
The Multi-Event-Class Synchronization (MECS) Algorithm
by
Paolo Alborno
et al
|
03-20-2019
|
Robot mirroring: A framework for self-tracking feedback
through empathy with an artificial agent representing
the self
by
Monica Perusquía-Hernández
et al
|