Select All | Select None
Login failed. Please try again.
Forgot your password?
Log in with Facebook
Log in with Google
You can now keep track of new articles from ACM SIGCHI Bulletin on your personalized homepage!
More Like This
A study of transaction logs from NLM's ELHILL system provided data on system feature usage and user search behavior. Several hypotheses were tested regarding the use of a pattern analysis methodology to represent and evaluate user behavior. Different classes of users (frequent, moderate,...
More Like This
This is a book that is intended not just to be read but to be used-through discussion, study, and prolonged reflection. The major concern of the book is, as the title implies, how humans interact with computers. The authors construct an empirically based cognitive theory of a skilled...
results per page
Save this article to read later. You can see your Read Later on your DeepDyve homepage.
To save an article, log in first, or sign up for a DeepDyve account if you don't already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don't already have one.
Read and print from thousands of top scholarly journals.
Sign up with Facebook
Sign up with Google
Already have an account? Log in
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don't already have one.