Center for Discrete Mathematics and Theoretical Computer Science (DIMACS)

Research Output 1974 2019

Filter
Conference contribution
2019

Living-learning community for women in computer science at Rutgers

Wright, R., Nadler, S. J., Nguyen, T., Sanchez Gomez, C. N. & Wright, H. M., Feb 22 2019, SIGCSE 2019 - Proceedings of the 50th ACM Technical Symposium on Computer Science Education. Association for Computing Machinery, Inc, p. 286-292 7 p. (SIGCSE 2019 - Proceedings of the 50th ACM Technical Symposium on Computer Science Education).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

computer science
Computer science
learning
community
Group
2018

A case study in tailoring a bio-inspired cyber-security algorithm: Designing anomaly detection for multilayer networks

Suárez, G., Gallos, L. & Fefferman, N. H., Aug 2 2018, Proceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018. Institute of Electrical and Electronics Engineers Inc., p. 281-286 6 p. 8424661

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Multilayers
Network protocols
Network layers
Denial-of-service attack

IGroup Learning and iDetect for Dynamic Anomaly Detection with Applications in Maritime Threat Detection

Cai, C., Chen, R., Liu, A. D., Roberts, F. & Xie, M., Dec 12 2018, 2018 IEEE International Symposium on Technologies for Homeland Security, HST 2018. Institute of Electrical and Electronics Engineers Inc., 8574162. (2018 IEEE International Symposium on Technologies for Homeland Security, HST 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

threat
learning
world economy
transportation system
statistical method

IGroup Learning and iDetect for Dynamic Anomaly Detection with Applications in Maritime Threat Detection

Cai, C., Chen, R., Liu, A. D., Roberts, F. & Xie, M., Dec 11 2018, Proceedings of 2018 10th International Conference on Knowledge and Systems Engineering, KSE 2018. Phuong, T. M. & Nguyen, M. L. (eds.). Institute of Electrical and Electronics Engineers Inc., 8573348. (Proceedings of 2018 10th International Conference on Knowledge and Systems Engineering, KSE 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Statistical methods
Threat
Anomaly detection
Early warning
Anomaly

Using Noisy Binary Search for Differentially Private Anomaly Detection

Bittner, D. M., Sarwate, A. & Wright, R., Jan 1 2018, Cyber Security Cryptography and Machine Learning - Second International Symposium, CSCML 2018, Proceedings. Dinur, I., Dolev, S. & Lodha, S. (eds.). Springer Verlag, p. 20-37 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10879 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Binary search
Anomaly Detection
Group Testing
Privacy
Anomalous
2017
1 Citation (Scopus)

Differentially private noisy search with applications to anomaly detection

Bittner, D. M., Sarwate, A. & Wright, R., Nov 3 2017, AISec 2017 - Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2017. Association for Computing Machinery, Inc, 1 p. (AISec 2017 - Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Keynote: Privacy in today's world

Wright, R., Oct 30 2017, CyberW 2017 - Proceedings of the 2017 Workshop on Women in Cyber Security, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 7-10 4 p. (CyberW 2017 - Proceedings of the 2017 Workshop on Women in Cyber Security, co-located with CCS 2017; vol. 2017-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile devices
2016
3 Citations (Scopus)

Differentially private online active learning with applications to anomaly detection

Ghassemi, M., Sarwate, A. & Wright, R., Oct 28 2016, AISec 2016 - Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2016. Association for Computing Machinery, Inc, p. 117-128 12 p. (AISec 2016 - Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning algorithms
Classifiers
Labels
Detectors
Problem-Based Learning

Meaningful and meaningless statements using metrics for the border condition

Roberts, F., Sep 14 2016, 2016 IEEE Symposium on Technologies for Homeland Security, HST 2016. Institute of Electrical and Electronics Engineers Inc., 7568936. (2016 IEEE Symposium on Technologies for Homeland Security, HST 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

The little-known challenge of maritime cyber security

Direnzo, J., Goward, D. A. & Roberts, F., Jan 20 2016, IISA 2015 - 6th International Conference on Information, Intelligence, Systems and Applications. Institute of Electrical and Electronics Engineers Inc., 7388071. (IISA 2015 - 6th International Conference on Information, Intelligence, Systems and Applications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

vulnerability
transportation system
Oils
2015
3 Citations (Scopus)

Experimental designs for testing metal detectors at a large sports stadium

Nelson, C., Kantor, P., Nakamura, B., Ricks, B., Whytlaw, R., Egan, D., Matlin, A., Roberts, F., Tobia, M. & Young, M., Aug 26 2015, 2015 IEEE International Symposium on Technologies for Homeland Security, HST 2015. Institute of Electrical and Electronics Engineers Inc., 7225280. (2015 IEEE International Symposium on Technologies for Homeland Security, HST 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Metal detectors
Stadiums
Sports
Design of experiments
experiment

Highly efficient evaluation design (HEED) for comparing algorithms used to detect nuclear materials

Kantor, P., Nelson, C., Roberts, F. & Pottenger, W. M., Jan 1 2015, IIE Annual Conference and Expo 2015. Institute of Industrial Engineers, p. 1842-1851 10 p. (IIE Annual Conference and Expo 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensors
Design of experiments
Radiation
Experiments

Optimal US coast guard boat allocations with sharing

Nakamura, B., Boros, E., Kantor, P., McGinity, C., Nelson, C., Oster, M., Ricks, B., Roberts, F., Yao, W., Ball, P., Conrad, C., Rader, T. & Hanson, K., Jan 1 2015, IIE Annual Conference and Expo 2015. Institute of Industrial Engineers, p. 2049-2058 10 p. (IIE Annual Conference and Expo 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Boats
Coastal zones
Laptop computers
Integer programming
Innovation
2014
3 Citations (Scopus)

ACCAM global optimization model for the USCG aviation air stations

Nelson, C., Boros, E., Roberts, F., Rubio-Herrero, J., Kantor, P., McGinity, C., Nakamura, B., Ricks, B., Ball, P., Conrad, C., Hanson, K. & Rader, T., Jan 1 2014, IIE Annual Conference and Expo 2014. Institute of Industrial Engineers, p. 2761-2770 10 p. (IIE Annual Conference and Expo 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Global optimization
Aviation
Coastal zones
Aircraft
Air
2 Citations (Scopus)

Modeling the impact of patron screening at an NFL stadium

Ricks, B. C., Nakamura, B., Almaz, A., DeMarco, R., Hui, C., Kantor, P., Matlin, A., Nelson, C., Powell, H., Roberts, F. & Thompson, B., Jan 1 2014, IIE Annual Conference and Expo 2014. Institute of Industrial Engineers, p. 3086-3095 10 p. (IIE Annual Conference and Expo 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Stadiums
Screening
National security
Magnetometers
Hazards

Open vs. closed systems for accountability

Feigenbaum, J., Jaggard, A. D. & Wright, R., Jan 1 2014, Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014. Association for Computing Machinery, 4. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Practical and privacy-preserving policy compliance for outsourced data

Di Crescenzo, G., Feigenbaum, J., Gupta, D., Panagos, E., Perry, J. & Wright, R., Jan 1 2014, Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Revised Selected Papers. Brenner, M., Smith, M., Böhme, R. & Moore, T. (eds.). Springer Verlag, p. 181-194 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8438).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy Preserving
Compliance
Network protocols
Query
Cryptography
6 Citations (Scopus)

Privacy-preserving publish/subscribe: Efficient protocols in a distributed model

Di Crescenzo, G., Coan, B., Schultz, J., Tsang, S. & Wright, R., Jan 1 2014, Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Revised Selected Papers. Springer Verlag, p. 114-132 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8247 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Publish/subscribe
Privacy Preserving
Cryptography
Encryption
Privacy
7 Citations (Scopus)

Systematizing secure computation for research and decision support

Perry, J., Gupta, D., Feigenbaum, J. & Wright, R., Jan 1 2014, Security and Cryptography for Networks - 9th International Conference, SCN 2014, Proceedings. de Prisco, R. & Abdalla, M. (eds.). Springer Verlag, p. 380-397 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8642).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secure Computation
Multiparty Computation
Decision Support
Secure multi-party Computation
Proposition
2013
1 Citation (Scopus)

A cloud-based mobile computing applications platform for first responders

Chung, C., Egan, D., Jain, A., Caruso, N., Misner, C. & Wallace, R., Aug 5 2013, Proceedings - 2013 IEEE 7th International Symposium on Service-Oriented System Engineering, SOSE 2013. p. 503-508 6 p. 6525568. (Proceedings - 2013 IEEE 7th International Symposium on Service-Oriented System Engineering, SOSE 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile computing
Application programs
Smartphones
Authentication
Costs
43 Citations (Scopus)

DP-WHERE: Differentially private modeling of human mobility

Mir, D. J., Isaacman, S., Caceres, R., Martonosi, M. & Wright, R., Dec 1 2013, Proceedings - 2013 IEEE International Conference on Big Data, Big Data 2013. p. 580-588 9 p. 6691626. (Proceedings - 2013 IEEE International Conference on Big Data, Big Data 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cellular telephones
Epidemiology
Urban planning
Ecology
Experiments
7 Citations (Scopus)

Efficient and private three-party publish/subscribe

Di Crescenzo, G., Burns, J., Coan, B., Schultz, J., Stanton, J., Tsang, S. & Wright, R., Sep 9 2013, Network and System Security - 7th International Conference, NSS 2013, Proceedings. p. 278-292 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7873 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Publish/subscribe
Privacy
Network protocols
Servers
Server

Estimating violation risk for fisheries regulations

Chalupsky, H., Demarco, R., Hovy, E. H., Kantor, P. B., Matlin, A., Mitra, P., Ozbas, B., Roberts, F., Wojtowicz, J. & Xie, M., Dec 16 2013, Algorithmic Decision Theory - Third International Conference, ADT 2013, Proceedings. p. 297-308 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8176 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fisheries
Coastal zones
Fishing vessels
Vessel
Fish
8 Citations (Scopus)

The design space of probing algorithms for network-performance measurement

Jaggard, A. D., Kopparty, S., Ramachandran, V. & Wright, R., Jul 22 2013, SIGMETRICS 2013 - Proceedings of the 2013 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems. 1 SPEC. ISS. ed. p. 105-116 12 p. (Performance Evaluation Review; vol. 41, no. 1 SPEC. ISS.).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network performance
Approximation algorithms
Fault detection
Telecommunication networks
Hardness
2012
13 Citations (Scopus)

A differentially private estimator for the stochastic Kronecker graph model

Mir, D. & Wright, R., Jul 27 2012, Proceedings - Joint EDBT/ICDT Workshops 2012. p. 167-176 10 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data mining
Probability distributions
Statistics
Sampling
2011
14 Citations (Scopus)

Accountability and deterrence in online life (extended abstract)

Feigenbaum, J., Hendler, J. A., Jaggard, A. D., Weitzner, D. J. & Wright, R., Jan 1 2011, Proceedings of the 3rd International Web Science Conference, WebSci 2011. Association for Computing Machinery, 7. (Proceedings of the 3rd International Web Science Conference, WebSci 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security of data

A method for transferring probabilistic user models between environments

Roberts, D. L. & Roberts, F., Dec 1 2011, Interactive Storytelling - 4th International Conference on Interactive Digital Storytelling, ICIDS 2011, Proceedings. p. 43-54 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7069 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

User Model
Probabilistic Model
Decision Making
Decision making
Model

Distributed computing with rules of thumb

Jaggard, A. D., Schapira, M. & Wright, R., Jul 7 2011, PODC'11 - Proceedings of the 2011 ACM Symposium Principles of Distributed Computing. p. 333-334 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Distributed computer systems
Game theory
Internet protocols
Scheduling
Economics
17 Citations (Scopus)

Pan-private algorithms via statistics on sketches

Mir, D., Muthukrishnan, S., Nikolov, A. & Wright, R., Jul 15 2011, PODS'11 - Proceedings of the 30th Symposium on Principles of Database Systems. p. 37-48 12 p. (Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Statistics
Data storage equipment
Decoding
Dynamic models
Processing
32 Citations (Scopus)

Towards a formal model of accountability

Feigenbaum, J., Jaggard, A. D. & Wright, R., Dec 1 2011, NSPW'11 - Proceedings of the 2011 New Security Paradigms Workshop. p. 45-55 11 p. (Proceedings New Security Paradigms Workshop).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information systems
2009
22 Citations (Scopus)

A differentially private graph estimator

Mir, D. J. & Wright, R., Dec 1 2009, ICDM Workshops 2009 - IEEE International Conference on Data Mining. p. 122-129 8 p. 5360515. (ICDM Workshops 2009 - IEEE International Conference on Data Mining).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data mining
Probability distributions
Sampling
41 Citations (Scopus)

A practical differentially private random decision tree classifier

Jagannathan, G., Pillaipakkamnatt, K. & Wright, R., Dec 1 2009, ICDM Workshops 2009 - IEEE International Conference on Data Mining. p. 114-121 8 p. 5360518. (ICDM Workshops 2009 - IEEE International Conference on Data Mining).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decision trees
Classifiers
Experiments
Costs
3 Citations (Scopus)

Privacy-preserving evaluation of generalization error and its application to model and attribute selection

Sakuma, J. & Wright, R., Dec 1 2009, Advances in Machine Learning - First Asian Conference on Machine Learning, ACML 2009, Proceedings. p. 338-353 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5828 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Generalization Error
Privacy Preserving
Attribute
Evaluation
Post-processing
1 Citation (Scopus)

The impact of communication models on routing-algorithm convergence

Jaggard, A. D., Ramachandran, V. & Wright, R., Oct 27 2009, 2009 29th IEEE International Conference on Distributed Computing Systems Workshops, ICDCS, 09. p. 58-67 10 p. 5158409. (Proceedings - International Conference on Distributed Computing Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Routing algorithms
Communication
Taxonomies
Telecommunication networks
2008
9 Citations (Scopus)

Privacy-preserving reinforcement learning

Sakuma, J., Kobayashi, S. & Wright, R., Nov 26 2008, Proceedings of the 25th International Conference on Machine Learning. p. 864-871 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reinforcement learning
Learning algorithms
2 Citations (Scopus)

Towards privacy-preserving model selection

Yang, Z., Zhong, S. & Wright, R., Apr 14 2008, Privacy, Security, and Trust in KDD - First ACM SIGKDD International Workshop, PinKDD 2007, Revised Selected Papers. p. 138-152 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4890 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy Preserving
Model Selection
Cross-validation
Partitioning
Data Mining
2007
5 Citations (Scopus)

Private inference control for aggregate database queries

Jagannathan, G. & Wright, R., Dec 1 2007, ICDM Workshops 2007 - Proceedings of the 17th IEEE International Conference on Data Mining Workshops. p. 711-716 6 p. 4476746. (Proceedings - IEEE International Conference on Data Mining, ICDM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Network protocols
23 Citations (Scopus)

Sequential decision making algorithms for port of entry inspection: Overcoming computational challenges

Madigan, D., Mittal, S. & Roberts, F., Oct 1 2007, ISI 2007: 2007 IEEE Intelligence and Security Informatics. p. 1-7 7 p. 4258665

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decision trees
Inspection
Decision making
Numerical methods
Sensors
2006
69 Citations (Scopus)

A new privacy-preserving distributed k-clustering algorithm

Jagannathan, G., Pillaipakkamnatt, K. & Wright, R., Jul 3 2006, Proceedings of the Sixth SIAM International Conference on Data Mining. p. 494-498 5 p. (Proceedings of the Sixth SIAM International Conference on Data Mining; vol. 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Clustering algorithms
Communication
Experiments
13 Citations (Scopus)

Experimental analysis of sequential decision making algorithms for port of entry inspection procedures

Anand, S., Madigan, D., Mammone, R., Pathak, S. & Roberts, F., Jan 1 2006, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings. Springer Verlag, p. 319-330 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experimental Analysis
Inspection
Decision making
Decision Making
Decision trees
1 Citation (Scopus)

Privacy-preserving data imputation

Jagannathan, G. & Wright, R., Dec 1 2006, Proceedings - ICDM Workshops 2006 - 6th IEEE International Conference on Data Mining - Workshops. p. 535-540 6 p. 4063685. (Proceedings - IEEE International Conference on Data Mining, ICDM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data privacy
Decision trees
69 Citations (Scopus)

Privacy-preserving queries on encrypted data

Yang, Z., Zhong, S. & Wright, R., Jan 1 2006, Computer Security - ESORICS 2006 - 11th European Symposium on Research in Computer Security, Proceedings. Springer Verlag, p. 479-495 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4189 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy Preserving
Query
Confidentiality
Database Systems
Encryption
2004
1 Citation (Scopus)

Efficient model-driven service brokering using web services

Cheng, K., Chung, C., Cochinwala, M., Egan, D., Falchuk, B., Lee, C., Lin, F. J., Shim, H. & Wullert, J., Sep 29 2004, Proceedings - IEEE International Conference on Web Services. p. 622-629 8 p. (Proceedings - IEEE International Conference on Web Services).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web services
Engines
DSL
Video on demand
Rapid prototyping
2000
2 Citations (Scopus)

Influencing software usage

Cranor, L. F. & Wright, R., Apr 1 2000, Proceedings of the 10th Conference on Computers, Freedom and Privacy: Challenging the Assumptions, CFP 2000. Association for Computing Machinery, Inc, p. 45-55 11 p. (Proceedings of the 10th Conference on Computers, Freedom and Privacy: Challenging the Assumptions, CFP 2000).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Electric wiring
Interoperability
Standardization
Cryptography

Obstacles to freedom and privacy by design

Wright, R., Apr 1 2000, Proceedings of the 10th Conference on Computers, Freedom and Privacy: Challenging the Assumptions, CFP 2000. Association for Computing Machinery, Inc, p. 97-100 4 p. (Proceedings of the 10th Conference on Computers, Freedom and Privacy: Challenging the Assumptions, CFP 2000).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1992
31 Citations (Scopus)

Multiparty secret key exchange using a random deal of cards

Fischer, M. J. & Wright, R., Jan 1 1992, Advances in Cryptology — CRYPTO 1991, Proceedings. Feigenbaum, J. (ed.). Springer Verlag, p. 141-155 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 576 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Key Exchange
Communication
Strings
Distinct
1991
33 Citations (Scopus)

Hypertext for the electronic library? CORE sample results

Egan, D., Lesk, M., Ketchum, R. D., Lochbaum, C. C., Remde, J. R., Littman, M. & Landauer, T. K., Sep 1 1991, HYPERTEXT 1991 - Proceedings of the 3rd Annual ACM Conference on Hypertext. Association for Computing Machinery, Inc, p. 299-312 14 p. (HYPERTEXT 1991 - Proceedings of the 3rd Annual ACM Conference on Hypertext).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hypertext systems
Chemical reactions
Experiments
1990
8 Citations (Scopus)

Evaluating hypermedia systems

Perlman, G., Egan, D., Ehrlich, K., Marchionini, G., Nielsen, J. & Shneiderman, B., Mar 1 1990, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 1990. Chew, J. C. & Whiteside, J. (eds.). Association for Computing Machinery, p. 387-390 4 p. (Conference on Human Factors in Computing Systems - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hypermedia systems
Information use
Complex networks
Feedback
1989
46 Citations (Scopus)

Behavioral evaluation and analysis of a hypertext browser

Egan, D., Remde, J. R., Landauer, T. K., Lochbaum, C. C. & Gomez, L. M., Jan 1 1989, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 1989. Association for Computing Machinery, p. 205-210 6 p. (Conference on Human Factors in Computing Systems - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Students
Statistics

Panel: Cognitive aspects of designing hypertext systems

Baird, P., Egan, D., Kinch, W., Smith, J. & Streitz, N. A., Nov 1 1989, Proceedings of the 2nd Annual ACM Conference on Hypertext, HYPERTEXT 1989. Association for Computing Machinery, Inc, 1 p. (Proceedings of the 2nd Annual ACM Conference on Hypertext, HYPERTEXT 1989).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hypertext systems