Sciweavers

1698 search results - page 221 / 340
» Who Students Interact With
Sort
View
CHI
2004
ACM
14 years 10 months ago
Pointing without a pointer
We present a method for performing selection tasks based on continuous control of multiple, competing agents who try to determine the user's intentions from their control beh...
John Williamson, Roderick Murray-Smith
CHI
2003
ACM
14 years 10 months ago
Semi-public displays for small, co-located groups
The majority of systems using public displays to foster awareness have focused on providing information across remote locations or among people who are loosely connected and lack ...
Elaine M. Huang, Elizabeth D. Mynatt
CHI
2003
ACM
14 years 10 months ago
Recommending collaboration with social networks: a comparative evaluation
Studies of information seeking and workplace collaboration often find that social relationships are a strong factor in determining who collaborates with whom. Social networks prov...
David W. McDonald
ESORICS
2002
Springer
14 years 9 months ago
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones
Network based intrusions have become a serious threat to the users of the Internet. Intruders who wish to attack computers attached to the Internet frequently conceal their identit...
Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu
CHI
2010
ACM
14 years 5 months ago
Using reinforcement to strengthen users' secure behaviors
Users have a strong tendency toward dismissing security dialogs unthinkingly. Prior research has shown that users' responses to security dialogs become significantly more tho...
Ricardo Villamarín-Salomón, Jos&eacu...