Sciweavers

143 search results - page 11 / 29
» Context-sensitive authorization in interaction patterns
Sort
View
127
Voted
IJHCI
2007
145views more  IJHCI 2007»
15 years 3 months ago
20 Years of Four HCI Conferences: A Visual Exploration
We present a visual exploration of the field of human-computer interaction through the author and article metadata of four of its major conferences: the ACM conferences on Comput...
Nathalie Henry, Howard Goodell, Niklas Elmqvist, J...
121
Voted
IEE
2008
117views more  IEE 2008»
15 years 3 months ago
Formal verification of systems with an unlimited number of components
1 2 3 In many real component-based systems and patterns of component interaction, there can be identified a stable part (like control component, server, instance handler) and a nu...
Pavlína Vareková, Barbora Zimmerova,...
133
Voted
ACMDIS
2004
ACM
15 years 9 months ago
Sharing multimedia content with interactive public displays: a case study
The Plasma Posters are large screen, digital, interactive posterboards designed for informal content sharing within teams, groups, organizations and communities. Leveraging the fa...
Elizabeth F. Churchill, Les Nelson, Laurent Denoue...
131
Voted
CHI
2010
ACM
15 years 10 months ago
Detecting professional versus personal closeness using an enterprise social network site
In this work we analyze the behavior on a company-internal social network site to determine which interaction patterns signal closeness between colleagues. Regression analysis sug...
Anna Wu, Joan Morris DiMicco, David R. Millen
114
Voted
ALIFE
2005
15 years 3 months ago
A Gene Network Model for Developing Cell Lineages
Biological development is a remarkably complex process. A single cell, in an appropriate environment, contains sufficient information to generate a variety of differentiated cell ...
Nicholas Geard, Janet Wiles