2009 |
25 | EE | Karen Renaud:
On user involvement in production of images used in visual authentication.
J. Vis. Lang. Comput. 20(1): 1-15 (2009) |
2008 |
24 | EE | Judy van Biljon,
Karen Renaud:
A Qualitative Study of the Applicability of Technology Acceptance Models to Senior Mobile Phone Users.
ER Workshops 2008: 228-237 |
23 | EE | Judy van Biljon,
Paula Kotzé,
Karen Renaud:
Mobile phone usage of young adults: the impact of motivational factors.
OZCHI 2008: 57-64 |
22 | EE | Karen Renaud,
Judy van Biljon:
Predicting technology acceptance and adoption by the elderly: a qualitative study.
SAICSIT Conf. 2008: 210-219 |
2007 |
21 | EE | Karen Renaud,
Judith Ramsay:
Now what was that password again? A more flexible way of identifying and authenticating our seniors.
Behaviour & IT 26(4): 309-322 (2007) |
2006 |
20 | EE | Dora Galvez-Cruz,
Karen Renaud:
What E-Grocery Customers really want: Personalised Personalisation.
LA-WEB 2006: 109-112 |
19 | EE | Ann Nosseir,
Richard C. H. Connor,
Karen Renaud:
Question-based group authentication.
OZCHI 2006: 277-283 |
2005 |
18 | EE | Karen Renaud,
Judith Bishop,
Johnny Li-Chang Lo,
Basil Worrall:
Algon: From Interchangeable Distributed Algorithms to Interchangeable Middleware.
Electr. Notes Theor. Comput. Sci. 114: 65-85 (2005) |
17 | EE | Antonella De Angeli,
Lynne M. Coventry,
Graham Johnson,
Karen Renaud:
Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems.
International Journal of Man-Machine Studies 63(1-2): 128-152 (2005) |
2004 |
16 | EE | Karen Renaud,
Judy van Biljon:
Teaching SQL - Which Pedagogical Horse for This Course?
BNCOD 2004: 244-256 |
15 | EE | Karen Renaud,
Antonella De Angeli:
My password is here! An investigation into visuo-spatial authentication mechanisms.
Interacting with Computers 16(6): 1017-1041 (2004) |
14 | | Karen Renaud:
Quantification of Authentication Mechanisms: a Usability Perspective.
J. Web Eng. 3(2): 95-123 (2004) |
2003 |
13 | | Judy van Biljon,
Karen Renaud:
Zazu - Investigating the Difference between Interaction Approaches in Advisory Support Systems for Curriculum.
INTERACT 2003 |
12 | EE | Karen Renaud,
Johnny Li-Chang Lo,
Judith Bishop,
Pieter van Zyl,
Basil Worrall:
Algon: A Framework for Supporting Comparison of Distributed Algorithm Performance.
PDP 2003: 425-432 |
2002 |
11 | EE | Judith Bishop,
Karen Renaud,
Basil Worrall:
Composition of Distributed Software with Algon - Concepts and Possibilities.
Electr. Notes Theor. Comput. Sci. 65(4): (2002) |
10 | | Karen Renaud:
Experience with statically-generated proxies for facilitating Java runtime specialisation.
IEE Proceedings - Software 149(6): 169-176 (2002) |
2001 |
9 | EE | Karen Renaud,
Tobias van Dyk:
Tailoring E-Commerce Sites to Ease Recovery after Disruptions.
COMPSAC 2001: 603- |
8 | | Karen Renaud,
Paula Kotzé,
Tobias van Dyk:
A Mechanism for Evalutaing Feedback of e-Commerce Sites.
I3E 2001: 389-398 |
7 | EE | Karen Renaud,
Huw Evans:
JavaCloak: Reflecting on Java Typing for Class Reuse Using Proxies.
Reflection 2001: 278-279 |
6 | | Karen Renaud,
Richard Cooper:
Considering Possible Outcomes and the User's Environment in Designing User Interfaces for Data Intensive Systems.
UIDIS 2001: 80-90 |
5 | EE | Karen Renaud,
John Barrow,
Petra le Roux:
Teaching programming from a distance: problems and a proposed solution.
SIGCSE Bulletin 33(4): 39-42 (2001) |
2000 |
4 | EE | Karen Renaud:
HERCULE : Non-invasively Tracking JavaTM Component-Based Application Activity.
ECOOP 2000: 447-471 |
3 | EE | Karen Renaud:
HERCULE: Monitoring Component-Based Application Activity and Enabling Post-Implementation Tailoring of Feedback.
PDSE 2000: 180-187 |
2 | | Karen Renaud,
Richard Cooper:
Feedback in human-computer interaction - characteristics and recommendations.
South African Computer Journal 26: 105-114 (2000) |
1999 |
1 | EE | Karen Renaud,
Richard Cooper:
An Error Reporting and Feedback Component for Component-Based Transaction Processing Systems.
UIDIS 1999: 141-150 |