Author of the publication

Detecting users' usage intentions for websites employing deep learning on eye-tracking data.

, , , , , and . Inf. Technol. Manag., 22 (4): 281-292 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards quantification of firewall policy complexity., , , , and . HotSoS, page 18:1-18:2. ACM, (2015)Influence of the Privacy Bird® user agent on user trust of different web sites., , , , and . Comput. Ind., 61 (4): 311-317 (2010)Effective Risk Communication for Android Apps., , , and . IEEE Trans. Dependable Secur. Comput., 11 (3): 252-265 (2014)Attentional gradient for crossmodal proximal-distal tactile cueing of visual spatial attention., , , and . ACM Trans. Appl. Percept., 8 (4): 23:1-23:12 (2011)Introduction to Special Issue: Foundations of Cognitive Science for the Design of Human-Computer Interactive Systems., and . Int. J. Hum. Comput. Interaction, 33 (1): i (2017)Failure Tolerant Teleoperation of a Kinematically Redundant Manipulator: An Experimental Study., , , and . ICRA, page 874-880. IEEE Robotics and Automation Society, (1999)Content preparation and management for e-commerce Web sites., , , , and . Commun. ACM, 46 (12): 289-299 (2003)CodeShield: towards personalized application whitelisting., , , and . ACSAC, page 279-288. ACM, (2012)How Users Read and Comprehend Privacy Policies., , , , , , , and . HCI (9), volume 4558 of Lecture Notes in Computer Science, page 802-811. Springer, (2007)Usability of User Agents for Privacy-Preference Specification., , and . HCI (9), volume 4558 of Lecture Notes in Computer Science, page 766-776. Springer, (2007)