Sciweavers

593 search results - page 86 / 119
» Results of a User Study on 2D Hurricane Visualization
Sort
View
CHI
2006
ACM
14 years 9 months ago
Why phishing works
To build systems shielding users from fraudulent (or phishing) websites, designers need to know which attack strategies work and why. This paper provides the first empirical evide...
Rachna Dhamija, J. D. Tygar, Marti A. Hearst
ICMI
2004
Springer
95views Biometrics» more  ICMI 2004»
14 years 2 months ago
EyePrint: support of document browsing with eye gaze trace
Current digital documents provide few traces to help user browsing. This makes document browsing difficult, and we sometimes feel it is hard to keep track of all of the informati...
Takehiko Ohno
CHI
2000
ACM
14 years 1 months ago
Putting the feel in 'look and feel'
Haptic devices are now commercially available and thus touch has become a potentially realistic solution to a variety of interaction design challenges. We report on an investigati...
Ian Oakley, Marilyn Rose McGee, Stephen A. Brewste...
SP
2007
IEEE
110views Security Privacy» more  SP 2007»
14 years 3 months ago
A Systematic Approach to Uncover Security Flaws in GUI Logic
To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the human-computer interface is compromised. GUI logic flaws ...
José Meseguer, Ralf Sasse, Helen J. Wang, Y...
ICMCS
2005
IEEE
70views Multimedia» more  ICMCS 2005»
14 years 2 months ago
A Multimodal Complexity Comprehension-Time Framework for Automated Presentation Synthesis
In this paper, we present a joint multimodal (audio, visual and text) framework to map the informational complexity of the media elements to comprehension time. The problem is imp...
Harini Sridharan, Aankus Mani, Hari Sundaram