Julian A. Cerruti's research while affiliated with IBM and other places

Publications (16)

Patent
Full-text available
A method, system, and computer usable program product for providing consistent cryptographic operations in a data processing environment using protected structured data objects are provided in the illustrative embodiments. A data input is received from an originating application by a security plug-in, both the application and the security plug-in e...
Patent
Full-text available
According to one embodiment of the present invention, a method for cross-service tagging is provided. The method includes creating connections to multiple applications, each application having multiple entities. Relationships are determined between the entities within a single application and between entities across multiple applications. A tag is...
Patent
Embodiments of the invention relate to partial authentication to access incremental information. An aspect of the invention concerns a method of authorizing access to information that comprises providing an initial segment of a password wherein the password includes password segments each associated with an incremental portion of the information. I...
Patent
A system and method are disclosed for protecting a password assigned to a user, the method comprising: providing a password entry screen having a virtual keyboard, the virtual keyboard including a plurality of character keys arranged in a non-QWERTY format; authenticating the user if a password submitted by the user accessing the password entry scr...
Conference Paper
Previous approaches to instruction interpretation have required either extensive domain adaptation or manually annotated corpora. This paper presents a novel approach to instruction interpretation that leverages a large amount of unannotated, easy-to-collect data from humans interacting with a virtual world. We compare several algorithms for automa...
Conference Paper
Full-text available
We all spend time every day looking for information in our email, yet we know little about this refinding process. Some users expend considerable preparatory effort creating complex folder structures to promote effective refinding. However modern email clients provide alternative opportunistic methods for access, such as search and threading, that...
Conference Paper
With all the information available on the web, there is a growing need to provide mobile access to this information for the large, growing population of mobile internet users. In this paper, we propose a solution to the problem of open web mobile information retrieval, by conducting a dialogue with the user over a simple text-based interface. Using...
Article
Full-text available
Today's conversational interfaces are largely based on the paradigm of information retrieval from databases. In this position paper, we propose a radically different approach: building CIs on top of existing web applications. Such a system will draw together research in task modeling, web usage mining, information extraction, as well as the vast am...
Conference Paper
Full-text available
This paper presents CoCo, a system that automates web tasks on a user's behalf through an interactive conversational interface. Given a short command such as "get road conditions for highway 88," CoCo synthesizes a plan to accomplish the task, executes it on the web, extracts an informative response, and returns the result to the user as a snippet...
Article
Full-text available
Email usage data from users in a large enterprise were analyzed according to country and geographical regions to explore for differences. Data of 13,877 employees from 29 countries in a global technology company were analyzed. We found statistically significant differences in several attributes of email usage. Users in the U.S. tend to retain large...
Conference Paper
We describe the design of bluemail, a web-based email system that provides message tagging, message threading, and email folders. We wanted to explore how this combination of features would help users manage and organize their email. We conducted a limited field test of the prototype by observing how users triage their own email using bluemail. Our...
Conference Paper
In this paper we present our approach to design and develop an enterprise email application called bluemail. We describe our development process that is orchestrated for fast, iterative deployments and aimed at offering increased transparency to our internal user community. We finish by discussing the relationship between iterative design and agile...
Conference Paper
Webmail clients provide millions of end users with convenient and ubiquitous access to electronic mail - the most successful collaboration tool ever. Web email clients are also the platform of choice for recent innovations on electronic mail and for integration of related information services into email. In the enterprise, however, webmail applicat...
Conference Paper
Multimedia content protection is a controversial topic. Content owners want to protect their rights while consumers want flexible usage, privacy and seamless content flow. In this tutorial we cover from cryptography fundamentals, to history, emerging standards, state-of-the-art approaches and live demos.
Conference Paper
Full-text available
As the marketplace for digital media increases we witness the rise of new media distribution models where timely delivery, convenience, privacy and personalization are essential features of competitive offerings. Consumers are looking for innovative ways to access content in a service-oriented manner that suits their mobile life style. This paper d...
Article
Full-text available
We present a case study describing the process and resulting design for the bluemail conversation viewer: a web-based mashup between social networking information and email threads within a corporate setting. In particular, we look closely at the role design played when adjoined to an agile development process. We discuss the benefits and trade-off...

Citations

... The simple Instruction Follower system described in Chapter 3 was published in Benotti et al. (2012). This paper details how to interpret an instruction in a VE without a manually annotated corpora: Given a corpus of instructions and the user actions that followed them, this approach associates the user-performed actions and the state of the VE to the given instruction. ...
... This is most likely related to PPB concerns (Baek et al., 2014;Chen et al., 2016). Another explanation is that email is a reliable, cost-effective and real-time communication tool, although a previous study showed that the usage of email as a communication tool has some geographical variations (Tang et al., 2009). ...
... Furthermore, another barrier is the low level of literacy or English literacy that prevents many needy users from making use of their powerful handsets effectively. On the other hand, advances in interaction experience of telephony voice user interfaces have seen good uptake by this underserved population in developing coun- tries [1, 5, 10] . Traditionally, they have not had any access to online information systems due to reasons of affordability, local relevance, and illiteracy. ...
... The function of the model is to evaluate the results of emergency information extraction by qualitative and quantitative methods. This paper constructs three aspects of the indicators, namely comprehensive accuracy of emergency geographic information (CAEGI) [19], toponomy recognition accuracy (TRA) [20], [21] and toponomy spatial accuracy (TSA) [22], [23]. The detailed quantitative assessment process is shown below (refer to Figure 6). ...
... Practitioners leverage this feature to implement sophisticated strategies, which we characterize as either feature-motivated or test-motivated. A commonly observed feature-motivated strategy is to branch out every new feature, in order to not jeopardize integrity of the current codebase (Wilcox et al. 2007). Building on this idea, Stober and Hansmann (2010) propose cross-functional development teams when exploring risky technology changes not yet on the roadmap. ...
... Bluemail [102], Calendar.help [17], Squadbox [75], Themail [21] Streaming Platforms (e.g., Twitch, YouTube Live, DouYu) BabyBot [91], Snapstream [105], StreamSketch [70], StreamWiki [69], VisPoll [14] Slack ...
... Unlike folders, tags are non-hierarchical and users can assign as many tags as they want to an information item. This apparent advantage has led to extensive development of many tag-related PIM prototypes, including: Phlat (Cutrell, Robbins, Dumais, & Sarin, 2006), TagFS (Bloehdorn & Völkel, 2006), Gnowsis (Sauermann et al., 2006), ConTag (Adrian, Sauermann, & Roth-Berghofer, 2007), TapGlance (Robbins, 2008), Zotero (Ma & Wiedenbeck, 2009), TAGtivity (Oleksik et al., 2009), BlueMail (Tang et al., 2008;Whittaker, Matthews, Cerruti, Badenes, & Tang, 2011) and TagStore (Voit, Andrews, & Slany, 2012). However, when folders and tags are compared for efficiency, cognitive load and frustration level in eight independent studies, the results are inconclusive across all measures and there is no clear indication that tags are superior to folders (Bergman, Gradovitch, Bar-Ilan, & Beyth-Marom, 2013). ...
... Due to the enormous daily workload and communication demands, a company will generate thousands of work-related emails each day. To meet the business demands, Webmail architecture has been optimized for enterprises since as early as 2007 [1]. ...
... Table 1, our database collected a good body of dyadic papers. For example, Medhi et al. [107] evaluated the usability of a task-oriented CA for novice and low-literacy users and was highly cited, followed by several other usability studies of CAs [71,72,90] on improving health [15,96], answering questions [95,98], and counseling [150,159] via CAs. Similarly, a sample of polyadic papers received high citations, as shown in Table 2. ...