Sciweavers

621 search results - page 71 / 125
» chi 2008
Sort
View
CHI
2008
ACM
14 years 10 months ago
Talc: using desktop graffiti to fight software vulnerability
With the proliferation of computer security threats on the Internet, especially threats such as worms that automatically exploit software flaws, it is becoming more and more impor...
Kandha Sankarpandian, Travis Little, W. Keith Edwa...
CHI
2008
ACM
14 years 10 months ago
Pick me!: link selection in expertise search results
Expertise locator systems have been designed to help find experts within organizations. While there are many examples of these systems in the literature, there has not been any sy...
N. Sadat Shami, Kate Ehrlich, David R. Millen
CHI
2008
ACM
14 years 10 months ago
Love and authentication
Passwords are ubiquitous, and users and service providers alike rely on them for their security. However, good passwords may sometimes be hard to remember. For years, security pra...
Markus Jakobsson, Erik Stolterman, Susanne Wetzel,...
CHI
2008
ACM
14 years 10 months ago
Threshold devices: looking out from the home
Threshold devices present information gathered from the home's surroundings to give new views on the domestic situation. We built two prototypes of different threshold device...
William W. Gaver, Andy Boucher, Andy Law, Sarah Pe...
CHI
2008
ACM
14 years 10 months ago
The effects of empathetic virtual characters on presence in narrative-centered learning environments
Recent years have seen a growing interest in the role that narrative can play in learning. With the emergence of narrative-centered learning environments that engage students by d...
Scott W. McQuiggan, Jonathan P. Rowe, James C. Les...