Sciweavers

169 search results - page 6 / 34
» Malicious interface design: exploiting the user
Sort
View
IJMHCI
2010
126views more  IJMHCI 2010»
13 years 4 months ago
Cocktail: Exploiting Bartenders' Gestures for Mobile Interaction
Recent mobile devices are capable of creating and storing a large amount of multimedia data, but sharing those data with others is still challenging. This paper presents Cocktail,...
Jong-Woon Yoo, Woomin Hwang, Hyunchul Seok, Sung K...
SIGDOC
2009
ACM
14 years 2 months ago
Semantic transparency in user assistance systems
In this paper we analyze the problem of “situating explanations” in user assistance systems. We introduce semantic transparency as a user interface property that enables givin...
Andrea Kohlhase, Michael Kohlhase
JASIS
2006
108views more  JASIS 2006»
13 years 7 months ago
Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems
P2P applications are rapidly gaining acceptance among users of Internet-based services, especially because of their capability of exchanging resources while preserving the anonymi...
Roberto Aringhieri, Ernesto Damiani, Sabrina De Ca...
CEAS
2007
Springer
14 years 1 months ago
TV-ACTA: Embedding an Activity-Centered Interface for Task Management in Email
In contextual computing, where cues beyond direct user input are used to trigger computation, one of the most daunting challenges is inferring what the user is doing. For the doma...
Victoria Bellotti, Jim Thornton, Alvin Chin, Diane...
EICS
2009
ACM
14 years 2 months ago
User evaluation of OIDE: a rapid prototyping platform for multimodal interaction
The Open Interface Development Environment (OIDE) was developed as part of the OpenInterface (OI) platform, an open source framework for the rapid development of multimodal intera...
Marilyn Rose McGee-Lennon, Andrew Ramsay, David K....