Sciweavers

2564 search results - page 305 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
CHI
2002
ACM
16 years 2 months ago
Breakdown visualization: multiple foci polyarchies of values and attributes
Breakdown analysis involves decomposing data into subgroups to allow for comparison and identification of problem areas. Good analysis requires the ability to group data based on ...
Sandeep Prabhakar, Nathan Conklin, Chris North, Mu...
103
Voted
CHI
2002
ACM
16 years 2 months ago
Automated message prioritization: making voicemail retrieval more efficient
Navigating through new voicemail messages to find messages of interest is a time-consuming task, particularly for high-volume users. When checking messages under a time constraint...
Meridith Ringel, Julia Hirschberg
CHI
2010
ACM
15 years 9 months ago
Learning basic dance choreographies with different augmented feedback modalities
We plan to evaluate different kinds of augmented feedback (tactile, video, sound) for learning basic dance choreographies. Therefore we develop a dance training system based on mo...
Dieter Drobny, Jan Borchers
CHI
2009
ACM
15 years 9 months ago
See you on the subway: exploring mobile social software
This project explores the social possibilities of mobile technology in transitional spaces such as public transport. Based on a cultural probes study of Stockholm subway commuters...
Nicolas Belloni, Lars Erik Holmquist, Jakob Tholan...
144
Voted
CHI
2009
ACM
15 years 9 months ago
Tagged photos: concerns, perceptions, and protections
Photo sharing has become a popular feature of many online social networking sites. Many of the photo sharing applications on these sites, allow users to annotate photos with those...
Andrew Besmer, Heather Richter Lipford