Sciweavers

1321 search results - page 189 / 265
» A Model-Driven Development Approach Focusing Human Interacti...
Sort
View
CHI
2006
ACM
14 years 8 months ago
Why phishing works
To build systems shielding users from fraudulent (or phishing) websites, designers need to know which attack strategies work and why. This paper provides the first empirical evide...
Rachna Dhamija, J. D. Tygar, Marti A. Hearst
CHI
2004
ACM
14 years 8 months ago
Breaking the book: translating the chemistry lab book into a pervasive computing lab environment
The UK e-Science programme is relying on the evolution of the paper lab book into a pervasive data gathering lab system. To date take up of existing commercial or research lab boo...
Monica M. C. Schraefel, Gareth V. Hughes, Hugo R. ...
CHI
2009
ACM
14 years 2 months ago
PhotoScope: visualizing spatiotemporal coverage of photos for construction management
PhotoScope visualizes the spatiotemporal coverage of photos in a photo collection. It extends the standard photo browsing paradigm in two main ways: visualizing spatial coverage o...
Fuqu Wu, Melanie Tory
OZCHI
2005
ACM
14 years 1 months ago
Spy-resistant keyboard: more secure password entry on public touch screen displays
Current software interfaces for entering text on touch screen devices mimic existing mechanisms such as keyboard typing or handwriting. These techniques are poor for entering priv...
Desney S. Tan, Pedram Keyani, Mary Czerwinski
ACMDIS
2004
ACM
14 years 1 months ago
Tutor design for speech-based interfaces
Speech-based applications commonly come with web-based or printed manuals. Alternatively, the dialogue can be designed so that users should be able to start using the application ...
Jaakko Hakulinen, Markku Turunen, Esa-Pekka Salone...