Sciweavers

7984 search results - page 1275 / 1597
» Exploring personal information
Sort
View
CHI
2008
ACM
16 years 5 months ago
Ninja cursors: using multiple cursors to assist target acquisition on large screens
We propose the "ninja cursor" to improve the performance of target acquisition, particularly on large screens. This technique uses multiple distributed cursors to reduce...
Masatomo Kobayashi, Takeo Igarashi
CHI
2008
ACM
16 years 5 months ago
Using tags to assist near-synchronous communication
In this work, we introduce the use of tags to support the near synchronous use of instant messaging (IM). As a proof-of-concept, we developed a plug-in in Lotus Sametime, an enter...
Gary Hsieh, Jennifer Lai, Scott E. Hudson, Robert ...
CHI
2008
ACM
16 years 5 months ago
Dynamic knobs: shape change as a means of interaction on a mobile phone
In this paper, we introduce the change of a mobile phone's hardware shape as a means of tactile interaction. The alteration of shape is implemented in a hardware prototype us...
André Knörig, Fabian Hemmert, Gesche J...
CHI
2008
ACM
16 years 5 months ago
Chromirror: a real-time interactive mirror for chromatic and color-harmonic dressing
This study presents the "ChroMirror" system, a digital mirror imaging system which helps users select appropriate clothing color combinations. By digitally rendering a m...
Chueh-Min Cheng, Meng-Fang Chung, Ming-Yang Yu, Mi...
124
Voted
CHI
2008
ACM
16 years 5 months ago
Memorability of persuasive passwords
Text passwords are the primary authentication method used for most online services. Many online users select weak passwords. Regrettably, most proposed methods of strengthening pa...
Alain Forget, Robert Biddle
« Prev « First page 1275 / 1597 Last » Next »