Sciweavers

169 search results - page 13 / 34
» Malicious interface design: exploiting the user
Sort
View
CHI
2009
ACM
14 years 8 months ago
An intuitive model of perceptual grouping for HCI design
Understanding and exploiting the abilities of the human visual system is an important part of the design of usable user interfaces and information visualizations. Good design enab...
Ruth Rosenholtz, Nathaniel R. Twarog, Nadja Schink...
CHI
2011
ACM
12 years 11 months ago
Oops, I did it again: mitigating repeated access control errors on facebook
We performed a study of Facebook users to examine how they coped with limitations of the Facebook privacy settings interface. Students graduating and joining the workforce create ...
Serge Egelman, Andrew Oates, Shriram Krishnamurthi
SIGMOD
2007
ACM
157views Database» more  SIGMOD 2007»
14 years 7 months ago
DaNaLIX: a domain-adaptive natural language interface for querying XML
We present DaNaLIX, a prototype domain-adaptive natural language interface for querying XML. Our system is an extension of NaLIX, a generic natural language interface for querying...
Yunyao Li, Ishan Chaudhuri, Huahai Yang, Satinder ...
DIM
2008
ACM
13 years 8 months ago
Anti-phishing based on automated individual white-list
In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
Ye Cao, Weili Han, Yueran Le
HPCA
1998
IEEE
13 years 12 months ago
Address Translation Mechanisms In Network Interfaces
Good network hardware performance is often squandered by overheads for accessing the network interface (NI) within a host. NIs that support user-level messaging avoid frequent ope...
Ioannis Schoinas, Mark D. Hill