Enervate 发表于 2025-3-23 10:18:40
Self-Management in Chronic Illnesseye-tracking meets cognitive modeling: applications to cyber security systems. In: Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, 9–14 July 2017, Proceedings. Lecture notes in computer science, vol.青石板 发表于 2025-3-23 17:24:54
http://reply.papertrans.cn/23/2291/229063/229063_12.png催眠 发表于 2025-3-23 19:01:04
Book 2020 some limitations preventing large-scale modeling and simulation tasks to be carried out efficiently and effectively. In this book, we aim to provide readers with a systematic overview of state-of-the-art cognitive modeling software tools and applications and an introduction to a new software framewgruelling 发表于 2025-3-24 01:03:54
Book 2020d a research prototype called CogTool+, including how to incorporate behavioral data such as eye-tracking data in modeling and simulation tasks. Typical applications of CogTool+ in HCI and cyber security are given to demonstrate its usefulness..多余 发表于 2025-3-24 02:44:17
Conclusion and Future Work,g tasks, this book present a conceptual framework CogFrame and a research prototype CogTool+ developed on top of the proposed framework. Further examples of using CogTool+ to model dynamic and complicated UIs are also presented in this book to demonstrate its effectiveness and usefulness.浪费物质 发表于 2025-3-24 07:13:56
http://reply.papertrans.cn/23/2291/229063/229063_16.pngTRACE 发表于 2025-3-24 12:23:34
1571-5035 ples of how to integrate cognitive psychology and computer s.Cognitive models and software tools have been widely used for both research and commercial purposes. Although they have proved very useful, there are some limitations preventing large-scale modeling and simulation tasks to be carried out eMuffle 发表于 2025-3-24 15:40:51
Cognitive Modeling for Automated Human Performance Evaluation at Scale978-3-030-45704-4Series ISSN 1571-5035 Series E-ISSN 2524-4477Accolade 发表于 2025-3-24 22:06:37
Beyond Industrial Self-Management,our work of using CogTool+ to model three existing systems. The first system is an observer-resistant password system called Undercover; the second one is a 6-digit PIN entry system, and the third one is data entry interfaces (part of this chapter will appear in a full paper which is currently under review. (Yuan, H., Li, S., Rusconi, P., “.”.))Hyperopia 发表于 2025-3-25 00:46:44
Jose Frantz,Laura Schopp,Anthea Rhoda understand human mind, as well as model and simulate human behaviors. Although they have been widely used and proved to be very useful, there are some challenges preventing large-scale modeling and simulation tasks from being conducted efficiently and effectively..To discuss and address these chall