Number of co-authors:13
Number of publications with 3 favourite co-authors:Jacob P. Baskin:1Andrew Oates:1Morgan McGuire:1
Shriram Krishnamurthi's 3 most productive colleagues in number of publications:Hanspeter Pfister:29Serge Egelman:13Morgan McGuire:6
A general principle for all user interface design is to go through all of your design elements and remove them one at a time. If the design works as well without a certain design element, kill it.
-- Jakob Nielsen, Designing Web Usability, p. 22.
Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess
User Experience and Experience Design !
Our Latest Books
Kumar and Herger 2013: Gamification at Work: Designing Engaging Business Software...
by Janaki Mythily Kumar and Mario Herger
Whitworth and Ahmad 2013: The Social Design of Technical Systems: Building technologies for communities...
by Brian Whitworth and Adnan Ahmad
Soegaard and Dam 2013: The Encyclopedia of Human-Computer Interaction, 2nd Ed....
by Mads Soegaard and Rikke Friis Dam
Publications by Shriram Krishnamurthi (bibliography)
Egelman, Serge, Oates, Andrew and Krishnamurthi, Shriram (2011): Oops, I did it again: mitigating repeated access control errors on Facebook. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems 2011. pp. 2295-2304.
We performed a study of Facebook users to examine how they coped with limitations of the Facebook privacy settings interface. Students graduating and joining the workforce create significant problems for all but the most basic privacy settings on social networking websites. We therefore created realistic scenarios exploiting work/play boundaries that required users to specify access control policies that were impossible due to various limitations. We examined whether users were aware of these problems without being prompted, and once given feedback, what their coping strategies were. Overall, we found that simply alerting participants to potential errors was ineffective, but when choices were also presented, participants introduced significantly fewer errors. Based on our findings, we designed a privacy settings interface based on Venn diagrams, which we validated with a usability study. We conclude that this interface may be more effective than the current privacy settings interface.
© All rights reserved Egelman et al. and/or their publisher
Guha, Arjun, Krishnamurthi, Shriram and Jim, Trevor (2009): Using static analysis for Ajax intrusion detection. In: Proceedings of the 2009 International Conference on the World Wide Web 2009. pp. 561-570.
© All rights reserved Guha et al. and/or ACM Press
Fisler, Kathi and Krishnamurthi, Shriram (2009): Escape from the matrix: lessons from a case-study in access-control requirements. In: Proceedings of the 2009 Symposium on Usable Privacy and Security 2009. p. 28.
Baskin, Jacob P. and Krishnamurthi, Shriram (2009): Preference aggregation in group recommender systems for committee decision-making. In: Proceedings of the 2009 ACM Conference on Recommender Systems 2009. pp. 337-340.
We present a preference aggregation algorithm designed for situations in which a limited number of users each review a small subset of a large (but finite) set of candidates. This algorithm aggregates scores by using users' relative preferences to search for a Kemeny-optimal ordering of items, and then uses this ordering to identify good and bad items, as well as those that are the subject of reviewer conflict. The algorithm uses variable-neighborhood local search, allowing the efficient discovery of high-quality consensus orderings while remaining computationally feasible. It provides a significant increase in solution quality over existing systems. We discuss potential applications of this algorithm in group recommender systems for a variety of scenarios, including program committees and faculty searches.
© All rights reserved Baskin and Krishnamurthi and/or ACM Press
McCarthy, Jay A., Krishnamurthi, Shriram, Guttman, Joshua D. and Ramsdell, John D. (2007): Compiling cryptographic protocols for deployment on the web. In: Proceedings of the 2007 International Conference on the World Wide Web 2007. pp. 687-696.
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management annotations are attached to protocol actions, and are used to constrain the behavior of a protocol participant to be compatible with its own trust policy. The first implementation of CPPL generated stand-alone, single-session servers, making it unsuitable for deploying protocols on the Web. We describe a new compiler that uses a constraint-based analysis to produce multi-session server programs. The resulting programs run without persistent TCP connections for deployment on traditional Web servers. Most importantly, the compiler preserves existing proofs about the protocols. We present an enhanced version of the CPPL language, discuss the generation and use of constraints, show their use in the compiler, formalize the preservation of properties, present subtleties, and outline implementation details.
© All rights reserved McCarthy et al. and/or International World Wide Web Conference Committee
McGuire, Morgan, Stathis, George, Pfister, Hanspeter and Krishnamurthi, Shriram (2006): Abstract shade trees. In: Olano, Marc and Séquin, Carlo H. (eds.) Proceedings of the 2006 Symposium on Interactive 3D Graphics, SI3D 2006, March 14-17, 2006, Redwood City, California, USA 2006. pp. 79-86.
Krishnamurthi, Shriram and Ramakrishnan, C. R. (eds.) Practical Aspects of Declarative Languages, 4th International Symposium - PADL 2002 January 19-20, 2002, Portland, OR, USA.
Show list on your website
Join our community and advance:
Changes to this page (author)07 Nov 2012: Modified05 Apr 2012: Modified
05 Jul 2011: Modified
14 Apr 2011: Modified
08 Sep 2009: Modified
09 Jul 2009: Modified
25 Jul 2007: Added
Page maintainer: The Editorial Team