default search action
Nikola Banovic 0001
Person information
- affiliation: University of Michigan, Ann Arbor, MI, USA
Other persons with the same name
- Nikola Banovic 0002 — University of Zagreb, Zagreb, Croatia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Nel Escher, Jeffrey Bilik, Nikola Banovic, Ben Green:
Code-ifying the Law: How Disciplinary Divides Afflict the Development of Legal Software. Proc. ACM Hum. Comput. Interact. 8(CSCW2): 1-37 (2024) - [c27]Nel Escher, Nikola Banovic:
Hexing Twitter: Channeling Ancient Magic to Bind Mechanisms of Extraction. CHI Extended Abstracts 2024: 557:1-557:6 - [c26]Sumit Asthana, Jane Im, Zhe Chen, Nikola Banovic:
"I know even if you don't tell me": Understanding Users' Privacy Preferences Regarding AI-based Inferences of Sensitive Information for Personalization. CHI 2024: 782:1-782:21 - [c25]Anindya Das Antar, Somayeh Molaei, Yan-Ying Chen, Matthew L. Lee, Nikola Banovic:
VIME: Visual Interactive Model Explorer for Identifying Capabilities and Limitations of Machine Learning Models for Sequential Decision-Making. UIST 2024: 59:1-59:21 - 2023
- [j10]Snehal Prabhudesai, Jeremiah Hauth, Dingkun Guo, Arvind Rao, Nikola Banovic, Xun Huan:
Lowering the computational barrier: Partially Bayesian neural networks for transparency in medical imaging AI. Frontiers Comput. Sci. 5 (2023) - [j9]Anindya Das Antar, Anna Kratz, Nikola Banovic:
Behavior Modeling Approach for Forecasting Physical Functioning of People with Multiple Sclerosis. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(1): 7:1-7:29 (2023) - [j8]Nikola Banovic, Zhuoran Yang, Aditya Ramesh, Alice Liu:
Being Trustworthy is Not Enough: How Untrustworthy Artificial Intelligence (AI) Can Deceive the End-Users and Gain Their Trust. Proc. ACM Hum. Comput. Interact. 7(CSCW1): 1-17 (2023) - [j7]Tahera Hossain, Wanggang Shen, Anindya Das Antar, Snehal Prabhudesai, Sozo Inoue, Xun Huan, Nikola Banovic:
A Bayesian Approach for Quantifying Data Scarcity when Modeling Human Behavior via Inverse Reinforcement Learning. ACM Trans. Comput. Hum. Interact. 30(1): 1-27 (2023) - [c24]Divya Ramesh, Caitlin Henning, Nel Escher, Haiyi Zhu, Min Kyung Lee, Nikola Banovic:
Ludification as a Lens for Algorithmic Management: A Case Study of Gig-Workers' Experiences of Ambiguity in Instacart Work. Conference on Designing Interactive Systems 2023: 638-651 - [c23]Jane Im, Ruiyi Wang, Weikun Lyu, Nick Cook, Hana Habib, Lorrie Faith Cranor, Nikola Banovic, Florian Schaub:
Less is Not More: Improving Findability and Actionability of Privacy Controls for Online Behavioral Advertising. CHI 2023: 661:1-661:33 - [c22]Snehal Prabhudesai, Leyao Yang, Sumit Asthana, Xun Huan, Q. Vera Liao, Nikola Banovic:
Understanding Uncertainty: How Lay Decision-makers Perceive and Interpret Uncertainty in Human-AI Decision Making. IUI 2023: 379-396 - 2022
- [j6]Xincheng Huang, Keylonnie L. Miller, Alanson P. Sample, Nikola Banovic:
StructureSense: Inferring Constructive Assembly Structures from User Behaviors. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(4): 204:1-204:25 (2022) - 2021
- [j5]Sumit Asthana, Sabrina Tobar Thommel, Aaron Lee Halfaker, Nikola Banovic:
Automatically Labeling Low Quality Content on Wikipedia By Leveraging Patterns in Editing Behaviors. Proc. ACM Hum. Comput. Interact. 5(CSCW2): 359:1-359:23 (2021) - [c21]Enhao Zhang, Nikola Banovic:
Method for Exploring Generative Adversarial Networks (GANs) via Automatically Generated Image Galleries. CHI 2021: 76:1-76:15 - [i3]Sumit Asthana, Sabrina Tobar Thommel, Aaron Lee Halfaker, Nikola Banovic:
Automatically Labeling Low Quality Content on Wikipedia by Leveraging Patterns in Editing Behaviors. CoRR abs/2108.02252 (2021) - 2020
- [j4]Nel Escher, Nikola Banovic:
Exposing Error in Poverty Management Technology: A Method for Auditing Government Benefits Screening Tools. Proc. ACM Hum. Comput. Interact. 4(CSCW): 064:1-064:20 (2020) - [c20]Kashyap Todi, Jean Vanderdonckt, Xiaojuan Ma, Jeffrey Nichols, Nikola Banovic:
AI4AUI: Workshop on AI Methods for Adaptive User Interfaces. IUI Companion 2020: 17-18 - [i2]Chung Hoon Hong, Yuan Liang, Sagnik Sinha Roy, Arushi Jain, Vihang Agarwal, Ryan Draves, Zhizhuo Zhou, William Chen, Yujian Liu, Martha Miracky, Lily Ge, Nikola Banovic, David Jurgens:
Audrey: A Personalized Open-Domain Conversational Bot. CoRR abs/2011.05910 (2020)
2010 – 2019
- 2019
- [c19]Nikola Banovic, Antti Oulasvirta, Per Ola Kristensson:
Computational Modeling in Human-Computer Interaction. CHI Extended Abstracts 2019 - [c18]Per Ola Kristensson, Nikola Banovic, Antti Oulasvirta, John Williamson:
Computational Interaction with Bayesian Methods. CHI Extended Abstracts 2019 - [c17]Nikola Banovic, Ticha Sethapakdi, Yasasvi Hari, Anind K. Dey, Jennifer Mankoff:
The Limits of Expert Text Entry Speed on Mobile Keyboards with Autocorrect. MobileHCI 2019: 15:1-15:12 - [c16]John Joon Young Chung, Fuhu Xiao, Nikola Banovic, Walter S. Lasecki:
Towards Instantaneous Recovery from Autonomous System Failures via Predictive Crowdsourcing. UIST (Adjunct Volume) 2019: 16-18 - 2018
- [b1]Nikola Banovic:
Computational Method for Understanding Complex Human Routine Behaviors. Carnegie Mellon University, USA, 2018 - [c15]Qian Yang, Nikola Banovic, John Zimmerman:
Mapping Machine Learning Advances from HCI Research to Reveal Starting Places for Design Innovation. CHI 2018: 130 - [c14]Rushil Khurana, Nikola Banovic, Kent Lyons:
In only 3 minutes: perceived exertion limits of smartwatch use. UbiComp 2018: 208-211 - 2017
- [j3]Nikola Banovic, John Krumm:
Warming Up to Cold Start Personalization. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1(4): 124:1-124:13 (2017) - [c13]Nikola Banovic:
Method for Understanding Complex Human Routine Behaviors from Large Behavior Logs. CHI Extended Abstracts 2017: 254-258 - [c12]Nikola Banovic, Varun Rao, Abinaya Saravanan, Anind K. Dey, Jennifer Mankoff:
Quantifying Aversion to Costly Typing Errors in Expert Mobile Text Entry. CHI 2017: 4229-4241 - [c11]Nikola Banovic, Anqi Wang, Yanfeng Jin, Christie Chang, Julian Ramos, Anind K. Dey, Jennifer Mankoff:
Leveraging Human Routine Models to Detect and Generate Human Behaviors. CHI 2017: 6683-6694 - 2016
- [c10]Nikola Banovic, Tofi Buzali, Fanny Chevalier, Jennifer Mankoff, Anind K. Dey:
Modeling and Understanding Human Routine Behavior. CHI 2016: 248-260 - [i1]Julian Ramos, Zhen Li, Johana Rosas, Nikola Banovic, Jennifer Mankoff, Anind K. Dey:
Keyboard Surface Interaction: Making the keyboard into a pointing device. CoRR abs/1601.04029 (2016) - 2015
- [j2]Nikola Banovic:
To Replicate or Not to Replicate? GetMobile Mob. Comput. Commun. 19(4): 23-27 (2015) - [c9]Karen Church, Denzil Ferreira, Nikola Banovic, Kent Lyons:
Understanding the Challenges of Mobile Phone Usage Data. MobileHCI 2015: 504-514 - 2014
- [c8]Christian Koehler, Nikola Banovic, Ian Oakley, Jennifer Mankoff, Anind K. Dey:
Indoor-ALPS: an adaptive indoor location prediction system. UbiComp 2014: 171-181 - [c7]Nikola Banovic, Christina Brant, Jennifer Mankoff, Anind K. Dey:
ProactiveTasks: the short of mobile device use sessions. Mobile HCI 2014: 243-252 - 2013
- [j1]Nikola Banovic, Koji Yatani, Khai N. Truong:
Escape-Keyboard: A Sight-Free One-Handed Text Entry Method for Mobile Touch-screen Devices. Int. J. Mob. Hum. Comput. Interact. 5(3): 42-61 (2013) - [c6]Nikola Banovic, Rachel L. Franz, Khai N. Truong, Jennifer Mankoff, Anind K. Dey:
Uncovering information needs for independent spatial learning for users who are visually impaired. ASSETS 2013: 24:1-24:8 - [c5]Nikola Banovic, Tovi Grossman, George W. Fitzmaurice:
The effect of time-based cost of error in target-directed pointing tasks. CHI 2013: 1373-1382 - 2012
- [c4]Koji Yatani, Nikola Banovic, Khai N. Truong:
SpaceSense: representing geographical information to visually impaired people using spatial tactile feedback. CHI 2012: 415-424 - [c3]Nikola Banovic, Fanny Chevalier, Tovi Grossman, George W. Fitzmaurice:
Triggering triggers and burying barriers to customizing software. CHI 2012: 2717-2726 - [c2]Nikola Banovic, Tovi Grossman, Justin Matejka, George W. Fitzmaurice:
Waken: reverse engineering usage information and interface structure from software videos. UIST 2012: 83-92 - 2011
- [c1]Nikola Banovic, Frank Chun Yat Li, David Dearman, Koji Yatani, Khai N. Truong:
Design of unimanual multi-finger pie menu interaction. ITS 2011: 120-129
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint