Sciweavers

813 search results - page 140 / 163
» Exploring iterative and parallel human computation processes
Sort
View
SOUPS
2005
ACM
14 years 1 months ago
Developing privacy guidelines for social location disclosure applications and services
In this article, we describe the design process of Reno, a location-enhanced, mobile coordination tool and person finder. The design process included three field experiments: a ...
Giovanni Iachello, Ian E. Smith, Sunny Consolvo, M...
HUC
2010
Springer
13 years 8 months ago
Groupthink: usability of secure group association for wireless devices
A fairly common modern setting entails users, each in possession of a personal wireless device, wanting to communicate securely, via their devices. If these users (and their devic...
Rishab Nithyanand, Nitesh Saxena, Gene Tsudik, Ers...
DSN
2006
IEEE
14 years 1 months ago
Designing dependable storage solutions for shared application environments
The costs of data loss and unavailability can be large, so businesses use many data protection techniques, such as remote mirroring, snapshots and backups, to guard against failur...
Shravan Gaonkar, Kimberly Keeton, Arif Merchant, W...
23
Voted
INTETAIN
2005
Springer
14 years 1 months ago
Telepresence Techniques for Controlling Avatar Motion in First Person Games
First person games are computer games, in which the user experiences the virtual game world from an avatar’s view. This avatar is the user’s alter ego in the game. In this pape...
Henning Groenda, Fabian Nowak, Patrick Rö&szl...
EICS
2010
ACM
13 years 11 months ago
WebWOZ: a wizard of oz prototyping framework
Language Technology (LT) based applications become more popular as technology improves. Prototyping early in the design process is critical for the development of high quality app...
Stephan Schlögl, Gavin Doherty, Nikiforos Kar...