Sciweavers

15811 search results - page 3110 / 3163
» Search-based software engineering
Sort
View
SOUPS
2005
ACM
14 years 3 months ago
Johnny 2: a user test of key continuity management with S/MIME and Outlook Express
Secure email has struggled with signifcant obstacles to adoption, among them the low usability of encryption software and the cost and overhead of obtaining public key certificat...
Simson L. Garfinkel, Robert C. Miller
SOUPS
2005
ACM
14 years 3 months ago
Developing privacy guidelines for social location disclosure applications and services
In this article, we describe the design process of Reno, a location-enhanced, mobile coordination tool and person finder. The design process included three field experiments: a ...
Giovanni Iachello, Ian E. Smith, Sunny Consolvo, M...
UIST
2005
ACM
14 years 3 months ago
Automation and customization of rendered web pages
On the desktop, an application can expect to control its user interface down to the last pixel, but on the World Wide Web, a content provider has no control over how the client wi...
Michael Bolin, Matthew Webber, Philip Rha, Tom Wil...
UIST
2005
ACM
14 years 3 months ago
Informal prototyping of continuous graphical interactions by demonstration
Informal prototyping tools have shown great potential in facilitating the early stage design of user interfaces. However, continuous interactions, an important constituent of high...
Yang Li, James A. Landay
UIST
2005
ACM
14 years 3 months ago
eyeLook: using attention to facilitate mobile media consumption
One of the problems with mobile media devices is that they may distract users during critical everyday tasks, such as navigating the streets of a busy city. We addressed this issu...
Connor Dickie, Roel Vertegaal, Changuk Sohn, Danie...
« Prev « First page 3110 / 3163 Last » Next »