Sciweavers

2604 search results - page 303 / 521
» Human Errors and System Requirements
Sort
View
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
14 years 2 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
IJRR
2006
123views more  IJRR 2006»
13 years 9 months ago
Hybrid Control of the Berkeley Lower Extremity Exoskeleton (BLEEX)
The first functional load-carrying and energetically autonomous exoskeleton was demonstrated at U.C. Berkeley, walking at the average speed of 0.9 m/s (2 mph) while carrying a 34 ...
Hami Kazerooni, Ryan Steger, Lihua Huang
BCSHCI
2008
13 years 10 months ago
Evaluating driver attention and driving behaviour: comparing controlled driving and simulated driving
Emerging in-vehicle systems have turned the contemporary car into a human-computer interaction context that has its own set of rules and challenges. Interacting with in-vehicle sy...
Kenneth Majlund Bach, Mads Gregers Jæger, Mi...
CHI
2009
ACM
14 years 10 months ago
DICE: designing conference rooms for usability
One of the core challenges now facing smart rooms is supporting realistic, everyday activities. While much research has been done to push forward the frontiers of novel interactio...
Gene Golovchinsky, Pernilla Qvarfordt, Bill van Me...
CHI
2009
ACM
14 years 10 months ago
CoSense: enhancing sensemaking for collaborative web search
Making sense of the information found during an investigational Web search task can be daunting. With the recent emergence of tools to support collaborative Web search, the associ...
Sharoda A. Paul, Meredith Ringel Morris