Sciweavers

1627 search results - page 184 / 326
» On context in authorization policy
Sort
View
CHI
2007
ACM
14 years 10 months ago
Usability of voting systems: baseline data for paper, punch cards, and lever machines
In the United States, computer-based voting machines are rapidly replacing other older technologies. While there is potential for this to be a usability improvement, particularly ...
Michael D. Byrne, Kristen K. Greene, Sarah P. Ever...
CHI
2006
ACM
14 years 10 months ago
Tensions in designing capture technologies for an evidence-based care community
Evidence-based care is an increasingly popular process for long term diagnosis and monitoring of education and healthcare disabilities. Because this evidence must also be collecte...
Gillian R. Hayes, Gregory D. Abowd
ESOP
2010
Springer
14 years 7 months ago
Automating Security Mediation Placement
Abstract. We present a framework that automatically produces suggestions to resolve type errors in security-typed programs, enabling legacy code to be retrofit with comprehensive s...
Dave King 0002, Divya Muthukumaran, Sanjit A. Sesh...
CSCW
2010
ACM
14 years 7 months ago
The work of sustaining order in wikipedia: the banning of a vandal
In this paper, we examine the social roles of software tools in the English-language Wikipedia, specifically focusing on autonomous editing programs and assisted editing tools. Th...
R. Stuart Geiger, David Ribes
CHI
2010
ACM
14 years 5 months ago
Cars, calls, and cognition: investigating driving and divided attention
Conversing on cell phones while driving an automobile is a common practice. We examine the interference of the cognitive load of conversational dialog with driving tasks, with the...
Shamsi T. Iqbal, Yun-Cheng Ju, Eric Horvitz