The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Robert W. Reeder: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Stuart K. Card, Peter Pirolli, Mija M. Van Der Wege, Julie Bauer Morrison, Robert W. Reeder, Pamela K. Schraedley, Jenea Boshart
    Information scent as a driver of Web behavior graphs: results of a protocol analysis method for Web usability. [Citation Graph (0, 0)][DBLP]
    CHI, 2001, pp:498-505 [Conf]
  2. Robert W. Reeder, Roy A. Maxion
    User Interface Dependability through Goal-Error Prevention. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:60-69 [Conf]
  3. Robert W. Reeder, Roy A. Maxion
    User Interface Defect Detection by Hesitation Analysis. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:61-72 [Conf]
  4. Robert W. Reeder, Fahd Arshad
    Soups 2005. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:5, pp:47-50 [Journal]
  5. Roy A. Maxion, Robert W. Reeder
    Improving user-interface dependability through mitigation of human error. [Citation Graph (0, 0)][DBLP]
    International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:25-50 [Journal]
  6. Robert W. Reeder, Clare-Marie Karat, John Karat, Carolyn Brodie
    Usability Challenges in Security and Privacy Policy-Authoring Interfaces. [Citation Graph (0, 0)][DBLP]
    INTERACT (2), 2007, pp:141-155 [Conf]

  7. A user study of policy creation in a flexible access-control system. [Citation Graph (, )][DBLP]


  8. Expandable grids for visualizing and authoring computer security policies. [Citation Graph (, )][DBLP]


  9. It's not what you know, but who you know: a social approach to last-resort authentication. [Citation Graph (, )][DBLP]


  10. Real life challenges in access-control management. [Citation Graph (, )][DBLP]


  11. Visual vs. compact: a comparison of privacy policy interfaces. [Citation Graph (, )][DBLP]


  12. A Comparative Study of Online Privacy Policies and Formats. [Citation Graph (, )][DBLP]


  13. A user study of the expandable grid applied to P3P privacy policy visualization. [Citation Graph (, )][DBLP]


  14. 1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authentication. [Citation Graph (, )][DBLP]


  15. A comparative study of online privacy policies and formats. [Citation Graph (, )][DBLP]


  16. It's not what you know, but who you know: a social approach to last-resort authentication. [Citation Graph (, )][DBLP]


  17. A "nutrition label" for privacy. [Citation Graph (, )][DBLP]


  18. A user study of the expandable grid applied to P3P privacy policy visualization. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002