Sciweavers

1418 search results - page 246 / 284
» How to Explain Mistakes
Sort
View
HICSS
2003
IEEE
103views Biometrics» more  HICSS 2003»
14 years 1 months ago
Trust, Trait Theory, and Collaboration in Telemedicine: A Circumplex Perspective
More than a process-automating tool, telemedicine is increasingly recognized for its ability to facilitate collaboration and knowledge creation between disparate healthcare provid...
Houghton G. Brown, Marshall Scott Poole, Thomas Le...
CCS
2003
ACM
14 years 1 months ago
DoS protection for UDP-based protocols
Since IP packet reassembly requires resources, a denial of service attack can be mounted by swamping a receiver with IP fragments. In this paper we argue how this attack need not ...
Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld
VR
2000
IEEE
101views Virtual Reality» more  VR 2000»
14 years 25 days ago
Multimodal Menu Presentation and Selection in Immersive Virtual Environments
Usability has become one of the key ingredients in making virtual reality (VR) systems work, and a big part of a usable VR system is in the design of effective interface/interacti...
Namgyu Kim, Gerard Jounghyun Kim, Chan-Mo Park, In...
TOOLS
1999
IEEE
14 years 22 days ago
Employing Object Technology to Expose Fundamental Object Concepts
This paper reports on the utilisation of object technology in a university-level course on software development, specifically designed for distance learning, and now enrolling ove...
Mark Woodman, Robert Griffiths, Simon Holland, Hug...
CHI
1996
ACM
14 years 18 days ago
Email Overload: Exploring Personal Information Management of Email
Email is one of the most successful computer applications yet devised. Our empirical data show however, that although email was originally designed as a communications application...
Steve Whittaker, Candace L. Sidner