Sciweavers

169 search results - page 14 / 34
» Malicious interface design: exploiting the user
Sort
View
CHI
2010
ACM
14 years 28 days ago
Hand in hand with the material: designing for suppleness
Designing for a supple interaction, involving users bodily and emotionally into a ‘dance’ with a system is a challenging task. Any break-ups in interaction become fatal to the...
Petra Sundström, Kristina Höök
DEBU
2008
165views more  DEBU 2008»
13 years 7 months ago
A Survey of Attack-Resistant Collaborative Filtering Algorithms
With the increasing popularity of recommender systems in commercial services, the quality of recommendations has increasingly become an important to study, much like the quality o...
Bhaskar Mehta, Thomas Hofmann
EHCI
1998
13 years 9 months ago
Toward the Automatic Construction of Task Models from Object-Oriented Diagrams
: Task models bridge the gap between HCI and Software Engineering. They are useful both for interface design and for generating user interface code and user documentation. These be...
Shijian Lu, Cécile Paris, Keith Vander Lind...
IUI
2012
ACM
12 years 3 months ago
1F: one accessory feature design for gesture recognizers
One Feature (1F) is a simple and intuitive pruning strategy that reduces considerably the amount of computations required by Nearest-Neighbor gesture classifiers while still pres...
Radu-Daniel Vatavu
GIS
2005
ACM
14 years 8 months ago
Visualizing the results of interactive queries for geographic data on mobile devices
The capabilities of current mobile computing devices such as PDAs and mobile phones are making it possible to design and develop mobile GIS applications that provide users with ge...
Stefano Burigat, Luca Chittaro