Sciweavers

169 search results - page 8 / 34
» Malicious interface design: exploiting the user
Sort
View
CHI
2000
ACM
13 years 12 months ago
Traversable interfaces between real and virtual worlds
Traversable interfaces establish the illusion that virtual and physical worlds are joined together and that users can physically cross from one to the other. Our design for a trav...
Boriana Koleva, Holger Schnädelbach, Steve Be...
DOCENG
2003
ACM
14 years 26 days ago
Handling syntactic constraints in a DTD-compliant XML editor
By exploiting the theories of automata and graphs, we propose algorithms and a process for editing valid XML documents [4][5]. The editing process avoids syntactic violations alto...
Y. S. Kuo, Jaspher Wang, N. C. Shih
OZCHI
2006
ACM
14 years 1 months ago
Indexical interaction design for context-aware mobile computer systems
This position paper outlines a current research project focusing on the challenges of interaction design for context-aware mobile computer systems. This challenge is approached fr...
Jesper Kjeldskov, Jeni Paay
AVI
2010
13 years 9 months ago
User task-based development of multi-device service-oriented applications
In this paper, we discuss a method and the associated tool support able to exploit Web services in model-based user interface development, starting with the results of a task anal...
Fabio Paternò, Carmen Santoro, Lucio Davide...
ICSE
2010
IEEE-ACM
14 years 11 days ago
Codebook: discovering and exploiting relationships in software repositories
Large-scale software engineering requires communication and collaboration to successfully build and ship products. We conducted a survey with Microsoft engineers on inter-team coo...
Andrew Begel, Yit Phang Khoo, Thomas Zimmermann