Sciweavers

392 search results - page 50 / 79
» Comparative Study of Interactive Systems in a Museum
Sort
View
CHI
2008
ACM
14 years 8 months ago
Undercover: authentication usable in front of prying eyes
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi
PUC
2008
146views more  PUC 2008»
13 years 7 months ago
Evaluating teamwork support in tabletop groupware applications using collaboration usability analysis
Tabletop groupware systems have natural advantages for collaboration, but they present a challenge for application designers because shared work and interaction progress in differe...
David Pinelle, Carl Gutwin
HT
2011
ACM
12 years 11 months ago
Automatic mining of cognitive metadata using fuzzy inference
Personalized search and browsing is increasingly vital especially for enterprises to able to reach their customers. Key challenge in supporting personalization is the need for ric...
Melike Sah, Vincent Wade
CHI
2008
ACM
14 years 8 months ago
Electronic voting machines versus traditional methods: improved preference, similar performance
In the 2006 U.S. election, it was estimated that over 66 million people would be voting on direct recording electronic (DRE) systems in 34% of the nation's counties [8]. Alth...
Sarah P. Everett, Kristen K. Greene, Michael D. By...
CHI
2005
ACM
14 years 8 months ago
Building security and trust in online banking
Growing threats to online banking security (e.g. phishing, personal identify fraud) and the personal nature of the data make the balance between security, trust and usability vita...
Maria Nilsson, Anne Adams, Simon Herd