Sciweavers

2948 search results - page 165 / 590
» More Principled Design of Pervasive Computing Systems
Sort
View
CHI
2006
ACM
16 years 4 months ago
Making memories: applying user input logs to interface design and evaluation
In this paper, we describe our approach to designing interface components that automate the logging of user input. These recorded logs of user-system interactions can serve as a b...
Tamara Babaian, Wendy T. Lucas, Heikki Topi
WWW
2003
ACM
16 years 5 months ago
Web browsing performance of wireless thin-client computing
Web applications are becoming increasingly popular for mobile wireless systems. However, wireless networks can have high packet loss rates, which can degrade web browsing performa...
S. Jae Yang, Jason Nieh, Shilpa Krishnappa, Aparna...
IPM
2008
89views more  IPM 2008»
15 years 4 months ago
Design and evaluation of awareness mechanisms in CiteSeer
Awareness has been extensively studied in human computer interaction (HCI) and computer supported cooperative work (CSCW). The success of many collaborative systems hinges on effe...
Umer Farooq, Craig H. Ganoe, John M. Carroll, Isaa...
FGCS
1998
91views more  FGCS 1998»
15 years 4 months ago
Computational steering in the CAVE
Scientists can gain much more insight from their simulations if they are enabled to change simulation parameters on the y while observing the results immediately. A crucial aspect...
Jurriaan D. Mulder, Robert van Liere, Jarke J. van...
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
15 years 10 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich