Sciweavers

2564 search results - page 304 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
96
Voted
CHI
2006
ACM
16 years 2 months ago
Whisper: analysis and design for a community event service
We present an analysis of what we call the community event space, looking at how social events are planned and organized. Based on a series of interviews, field studies, and a foc...
Jennifer Ng, Jonathan Terleski, Jason I. Hong
116
Voted
CHI
2005
ACM
16 years 2 months ago
The bubble cursor: enhancing target acquisition by dynamic resizing of the cursor's activation area
We present the bubble cursor ? a new target acquisition technique based on area cursors. The bubble cursor improves upon area cursors by dynamically resizing its activation area d...
Tovi Grossman, Ravin Balakrishnan
CHI
2005
ACM
16 years 2 months ago
Info-lotus: a peripheral visualization for email notification
We designed a peripheral notification visualization called "Info-Lotus". The Info-Lotus is an aesthetically pleasing visualization that offers users a "glance-able&...
Leizhong Zhang, Nan Tu, Dave Vronay
CHI
2004
ACM
16 years 2 months ago
Context photography: modifying the digital camera into a new creative tool
Context photography consists of capturing context when taking a picture, by sensing physical input in addition to light and representing it visually in real time. By developing th...
Sara Ljungblad, Maria Håkansson, Lalya Gaye,...
96
Voted
CHI
2002
ACM
16 years 2 months ago
Camping in the digital wilderness: tents and flashlights as interfaces to virtual worlds
A projection screen in the shape of a tent provides children with a shared immersive experience of a virtual world based on the metaphor of camping. RFID aerials at its entrances ...
Jonathan Green, Holger Schnädelbach, Boriana ...