Sciweavers

1787 search results - page 257 / 358
» classification 2006
Sort
View
CHI
2006
ACM
14 years 9 months ago
Why phishing works
To build systems shielding users from fraudulent (or phishing) websites, designers need to know which attack strategies work and why. This paper provides the first empirical evide...
Rachna Dhamija, J. D. Tygar, Marti A. Hearst
CHI
2006
ACM
14 years 9 months ago
A large scale study of wireless search behavior: Google mobile search
We present a large scale study of search patterns on Google's mobile search interface. Our goal is to understand the current state of wireless search by analyzing over 1 Mill...
Maryam Kamvar, Shumeet Baluja
CHI
2006
ACM
14 years 9 months ago
Quantifying interpersonal influence in face-to-face conversations based on visual attention patterns
A novel measure for automatically quantifying the amount of interpersonal influence present in face-toface conversations is proposed based on the visualattention patterns of the p...
Kazuhiro Otsuka, Junji Yamato, Yoshinao Takemae, H...
CHI
2006
ACM
14 years 9 months ago
Emoticons convey emotions without cognition of faces: an fMRI study
In this paper, we describe the brain activities that are associated with emoticons by using functional MRI (fMRI). In communication over a computer network, we use faces such as c...
Masahide Yuasa, Keiichi Saito, Naoki Mukawa
CHI
2006
ACM
14 years 2 months ago
Can a virtual cat persuade you?: the role of gender and realism in speaker persuasiveness
This study examines the roles of gender and visual realism in the persuasiveness of speakers. Participants were presented with a persuasive passage delivered by a male or female p...
Catherine A. Zanbaka, Paula Goolkasian, Larry F. H...