Sciweavers

1172 search results - page 134 / 235
» Who killed design
Sort
View
CHI
2005
ACM
14 years 10 months ago
How to make secure email easier to use
Cryptographically protected email has a justly deserved reputation of being difficult to use. Based on an analysis of the PEM, PGP and S/MIME standards and a survey of 470 merchan...
Simson L. Garfinkel, David Margrave, Jeffrey I. Sc...
CHI
2005
ACM
14 years 10 months ago
A logic block enabling logic configuration by non-experts in sensor networks
Recent years have seen the evolution of networks of tiny low power computing blocks, known as sensor networks. In one class of sensor networks, a non-expert user, who has little o...
Susan Cotterell, Frank Vahid
CHI
2005
ACM
14 years 10 months ago
Community source development: an emerging model with new opportunities
This paper focuses on an emerging model for software development in higher education: community source. Community source seeks to blend aspects of both open source and traditional...
Dawn Ressel Nidy, Fong Kwok
CHI
2005
ACM
14 years 10 months ago
Blind learners programming through audio
The development of programming skills is a motivating issue in computer science. Programming languages have been increasingly used to map end-users needs and mental models. The nu...
Jaime Sánchez, Fernando Aguayo
CHI
2004
ACM
14 years 10 months ago
One-hundred days in an activity-centric collaboration environment based on shared objects
This paper describes a new collaboration technology that is carefully poised between informal, ad hoc, easy-to-initiate collaborative tools, vs. more formal, structured, and higho...
Michael J. Muller, Werner Geyer, Beth Brownholtz, ...