The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Karen Renaud: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Karen Renaud, Judy van Biljon
    Teaching SQL - Which Pedagogical Horse for This Course? [Citation Graph (0, 0)][DBLP]
    BNCOD, 2004, pp:244-256 [Conf]
  2. Karen Renaud, Tobias van Dyk
    Tailoring E-Commerce Sites to Ease Recovery after Disruptions. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2001, pp:603-0 [Conf]
  3. Karen Renaud
    HERCULE : Non-invasively Tracking JavaTM Component-Based Application Activity. [Citation Graph (0, 0)][DBLP]
    ECOOP, 2000, pp:447-471 [Conf]
  4. Karen Renaud, Paula Kotzé, Tobias van Dyk
    A Mechanism for Evalutaing Feedback of e-Commerce Sites. [Citation Graph (0, 0)][DBLP]
    I3E, 2001, pp:389-398 [Conf]
  5. Judy van Biljon, Karen Renaud
    Zazu - Investigating the Difference between Interaction Approaches in Advisory Support Systems for Curriculum. [Citation Graph (0, 0)][DBLP]
    INTERACT, 2003, pp:- [Conf]
  6. Dora Galvez-Cruz, Karen Renaud
    What E-Grocery Customers really want: Personalised Personalisation. [Citation Graph (0, 0)][DBLP]
    LA-WEB, 2006, pp:109-112 [Conf]
  7. Karen Renaud, Johnny Lo, Judith Bishop, Pieter van Zyl, Basil Worrall
    Algon: A Framework for Supporting Comparison of Distributed Algorithm Performance. [Citation Graph (0, 0)][DBLP]
    PDP, 2003, pp:425-432 [Conf]
  8. Karen Renaud
    HERCULE: Monitoring Component-Based Application Activity and Enabling Post-Implementation Tailoring of Feedback. [Citation Graph (0, 0)][DBLP]
    PDSE, 2000, pp:180-187 [Conf]
  9. Karen Renaud, Huw Evans
    JavaCloak: Reflecting on Java Typing for Class Reuse Using Proxies. [Citation Graph (0, 0)][DBLP]
    Reflection, 2001, pp:278-279 [Conf]
  10. Karen Renaud, Richard Cooper
    Considering Possible Outcomes and the User's Environment in Designing User Interfaces for Data Intensive Systems. [Citation Graph (0, 0)][DBLP]
    UIDIS, 2001, pp:80-90 [Conf]
  11. Karen Renaud, Richard Cooper
    An Error Reporting and Feedback Component for Component-Based Transaction Processing Systems. [Citation Graph (0, 0)][DBLP]
    UIDIS, 1999, pp:141-150 [Conf]
  12. Judith Bishop, Karen Renaud, Basil Worrall
    Composition of Distributed Software with Algon - Concepts and Possibilities. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2002, v:65, n:4, pp:- [Journal]
  13. Karen Renaud, Judith Bishop, Johnny Lo, Basil Worrall
    Algon: From Interchangeable Distributed Algorithms to Interchangeable Middleware. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:114, n:, pp:65-85 [Journal]
  14. Karen Renaud
    Experience with statically-generated proxies for facilitating Java runtime specialisation. [Citation Graph (0, 0)][DBLP]
    IEE Proceedings - Software, 2002, v:149, n:6, pp:169-176 [Journal]
  15. Antonella De Angeli, Lynne M. Coventry, Graham Johnson, Karen Renaud
    Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. [Citation Graph (0, 0)][DBLP]
    International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:128-152 [Journal]
  16. Karen Renaud, Antonella De Angeli
    My password is here! An investigation into visuo-spatial authentication mechanisms. [Citation Graph (0, 0)][DBLP]
    Interacting with Computers, 2004, v:16, n:6, pp:1017-1041 [Journal]
  17. Karen Renaud
    Quantification of Authentication Mechanisms: a Usability Perspective. [Citation Graph (0, 0)][DBLP]
    J. Web Eng., 2004, v:3, n:2, pp:95-123 [Journal]
  18. Karen Renaud, Richard Cooper
    Feedback in human-computer interaction - characteristics and recommendations. [Citation Graph (0, 0)][DBLP]
    South African Computer Journal, 2000, v:26, n:, pp:105-114 [Journal]

  19. Armchair authentication. [Citation Graph (, )][DBLP]


  20. You Know My 'Alter-Ego'--but You Don't Know Me!. [Citation Graph (, )][DBLP]


  21. A Qualitative Study of the Applicability of Technology Acceptance Models to Senior Mobile Phone Users. [Citation Graph (, )][DBLP]


  22. Everyone Abandons - Eventually: Understanding the Online Shopping Experience. [Citation Graph (, )][DBLP]


  23. Question-based group authentication. [Citation Graph (, )][DBLP]


  24. Mobile phone usage of young adults: the impact of motivational factors. [Citation Graph (, )][DBLP]


  25. Predicting technology acceptance and adoption by the elderly: a qualitative study. [Citation Graph (, )][DBLP]


  26. Visual passwords: cure-all or snake-oil? [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002