default search action
Gisela Susanne Bahr
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [c17]Gisela Susanne Bahr, Stephen L. Wood, John William Blood:
Design Engineering for Universal Access: Software and Cognitive Challenges in Computer Based Problem-Solving. HCI (9) 2016: 16-25 - [c16]Marc Ritter, Danny Kowerko, Hussein Hussein, Manuel Heinzig, Tobias Schlosser, Robert Manthey, Gisela Susanne Bahr:
Simplifying Accessibility Without Data Loss: An Exploratory Study on Object Preserving Keyframe Culling. HCI (9) 2016: 492-504 - 2015
- [j2]Stephen L. Wood, Gisela Susanne Bahr, Marc Ritter:
Cognitive Tools for Design Engineers: A Framework for the Development of Intelligent CAD Systems. i-com 14(2): 138-146 (2015) - [c15]Gisela Susanne Bahr, Stephen L. Wood, Anthony Escandon:
Design Engineering and Human Computer Interaction: Function Oriented Problem Solving in CAD Applications. HCI (7) 2015: 13-24 - [c14]Gisela Susanne Bahr, Stephen L. Wood:
The big data between your ears: Human inspired heuristics for forgetting in databases. ICME Workshops 2015: 1-6 - [c13]Marc Ritter, Gisela Susanne Bahr:
An exploratory study to identify relevant cues for the deletion of faces for multimedia retrieval. ICME Workshops 2015: 1-6 - [c12]Marc Ritter, Markus Rickert, Lokesh Juturu Chenchu, Stefan Kahl, Robert Herms, Hussein Hussein, Manuel Heinzig, Robert Manthey, Daniel Richter, Gisela Susanne Bahr, Maximilian Eibl:
Technische Universität Chemnitz at TRECVID Instance Search 2015. TRECVID 2015 - 2014
- [c11]Yasser M. Hausawi, William H. Allen, Gisela Susanne Bahr:
Choice-Based Authentication: A Usable-Security Approach. HCI (4) 2014: 114-124 - 2013
- [c10]Gisela Susanne Bahr, William H. Allen:
Rational Interfaces for Effective Security Software: Polite Interaction Guidelines for Secondary Tasks. HCI (6) 2013: 165-174 - [c9]Liam M. Mayron, Yasser M. Hausawi, Gisela Susanne Bahr:
Secure, Usable Biometric Authentication Systems. HCI (6) 2013: 195-204 - [c8]Gisela Susanne Bahr, Melissa M. Walwanis Nelson, Beth F. Wheeler Atkinson:
Musically Inspired Computer Interfaces: Reaction Time and Memory Enhancements in Visuo-Spatial Timelines (ViST) for Graphic User Interfaces. HCI (7) 2013: 555-564 - 2011
- [j1]Gisela Susanne Bahr, Richard A. Ford:
How and why pop-ups don't work: Pop-up prompted eye movements, user affect and decision making. Comput. Hum. Behav. 27(2): 776-783 (2011) - [c7]Ray Adams, Gisela Susanne Bahr, Ejder Sevgen Raif:
Age-Related Accessibility Biases in Pass-Face Recognition. HCI (6) 2011: 423-431 - [c6]Gisela Susanne Bahr, Liam M. Mayron, Hannah J. Gacey:
Cyber Risks to Secure and Private Universal Access. HCI (5) 2011: 433-442
2000 – 2009
- 2009
- [c5]Gisela Susanne Bahr, Matthew G. Bell, Jason Metz, Sarah Sowle, Elizabeth Beasley:
A Modern Integration of Cognitive and Computer Sciences. HCI (5) 2009: 441-449 - 2007
- [c4]Jens Wissmann, Gisela Susanne Bahr:
Bilingual Mapping Visualizations as Tools for Chinese Language Acquisition. HCI (2) 2007: 171-180 - [c3]Beth F. Wheeler Atkinson, Troy O. Bennett, Gisela Susanne Bahr, Melissa M. Walwanis Nelson:
Development of a Multiple Heuristics Evaluation Table (MHET) to Support Software Development and Usability Analysis. HCI (5) 2007: 563-572 - [c2]Gisela Susanne Bahr, Carey D. Balaban, Mariofanna G. Milanova, Howard Choe:
Nonverbally Smart User Interfaces: Postural and Facial Expression Data in Human Computer Interaction. HCI (6) 2007: 740-749 - 2006
- [c1]Gisela Susanne Bahr, Beth F. Wheeler Atkinson, Melissa M. Walwanis Nelson:
A Participatory Evaluation Method of Graphic User Interface Storyboards: FAST AIDE (Function Annotated Storyboards Targeting Applicability, Importance, Design, Elaborations). Universal Access in Ambient Intelligence Environments 2006: 261-272
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint