Sciweavers

524 search results - page 89 / 105
» Why phishing works
Sort
View
CHI
2009
ACM
14 years 10 months ago
Focus on driving: how cognitive constraints shape the adaptation of strategy when dialing while driving
We investigate how people adapt their strategy for interleaving multiple concurrent tasks to varying objectives. A study was conducted in which participants drove a simulated vehi...
Duncan P. Brumby, Dario D. Salvucci, Andrew Howes
CHI
2005
ACM
14 years 10 months ago
Towards an index of opportunity: understanding changes in mental workload during task execution
To contribute to systems that reason about human attention, our work empirically demonstrates how a user's mental workload changes during task execution. We conducted a study...
Shamsi T. Iqbal, Piotr D. Adamczyk, Xianjun Sam Zh...
CHI
2004
ACM
14 years 10 months ago
Interactive Comprehensible Data Mining
This paper discusses a novel data mining system devised and developed at Birmingham, which attempts to provide a more effective data mining system. It ties in with the workshop go...
Andy Pryke, Russell Beale
CHI
2002
ACM
14 years 10 months ago
Effects of four computer-mediated communications channels on trust development
When virtual teams need to establish trust at a distance, it is advantageous for them to use rich media to communicate. We studied the emergence of trust in a social dilemma game ...
Nathan Bos, Judith S. Olson, Darren Gergle, Gary M...
SIGMOD
2004
ACM
204views Database» more  SIGMOD 2004»
14 years 10 months ago
Buffering Database Operations for Enhanced Instruction Cache Performance
As more and more query processing work can be done in main memory, memory access is becoming a significant cost component of database operations. Recent database research has show...
Jingren Zhou, Kenneth A. Ross