Sciweavers

1991 search results - page 24 / 399
» Trusted Interaction: User Control and System Responsibilitie...
Sort
View
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
14 years 1 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami
CHI
2007
ACM
14 years 7 months ago
Enhancing ubiquitous computing with user interpretation: field testing the home health horoscope
Domestic ubiquitous computing systems often rely on inferences about activities in the home, but the open-ended, dynamic and heterogeneous nature of the home poses serious problem...
William W. Gaver, Phoebe Sengers, Tobie Kerridge, ...
HF
2002
95views more  HF 2002»
13 years 7 months ago
Formal Verification of Human-Automation Interaction
This paper discusses a formal and rigorous approach to the analysis of operator interaction with machines. It addresses the acute problem of detecting design errors in human-machi...
Asaf Degani, Michael Heymann
RECSYS
2010
ACM
13 years 7 months ago
Interactive recommendations in social endorsement networks
An increasing number of social networking platforms are giving users the option to endorse entities that they find appealing, such as videos, photos, or even other users. We defin...
Theodoros Lappas, Dimitrios Gunopulos
CHI
2009
ACM
14 years 8 months ago
Designing for all users: including the odd users
The field of HCI has played an important role in broadening the spectrum of users of computational artifacts. However, users with extreme preferences are mostly ignored by the des...
Jina Huh, Mark S. Ackerman