Sciweavers

CHI
2004
ACM
14 years 12 months ago
Privacy policies as decision-making tools: an evaluation of online privacy notices
Studies have repeatedly shown that users are increasingly concerned about their privacy when they go online. In response to both public interest and regulatory pressures, privacy ...
Carlos Jensen, Colin Potts
CHI
2004
ACM
14 years 12 months ago
Performance of menu-augmented soft keyboards
We report results on the performance of the combination of soft keyboards and marking menus. A model of expert user performance indicated an 11 - 37% (depending on the keyboard la...
Poika Isokoski
CHI
2004
ACM
14 years 12 months ago
Acquiring in situ training data for context-aware ubiquitous computing applications
Ubiquitous, context-aware computer systems may ultimately enable computer applications that naturally and usefully respond to a user's everyday activity. Although new algorit...
Stephen S. Intille, Ling Bao, Emmanuel Munguia Tap...
CHI
2004
ACM
14 years 12 months ago
Robotic camera control for remote exploration
A video stream from a single camera is often the foundation for situational awareness in teleoperation activities. Poor camera placement, narrow field-of-view and other camera pro...
Stephen B. Hughes, Michael Lewis
CHI
2004
ACM
14 years 12 months ago
IM here: public instant messaging on large, shared displays for workgroup interactions
Instant messaging (IM) in the workplace has proven to be a valuable tool for facilitating informal communication. Its benefits, however, are generally limited to times when users ...
Elaine M. Huang, Daniel M. Russell, Alison E. Sue
CHI
2004
ACM
14 years 12 months ago
Presiding over accidents: system direction of human action
As human-computer interaction becomes more closely modeled on human-human interaction, new techniques and strategies for human-computer interaction are required. In response to th...
Jeffrey Heer, Nathaniel Good, Ana Ramirez, Marc Da...
CHI
2004
ACM
14 years 12 months ago
Energy-aware user interfaces: an evaluation of user acceptance
The utility of a handheld device is often constrained by the battery life, particularly with recent usage patterns where the device is likely to be powered on at all times. The di...
Tim Harter, Sander Vroegindeweij, Erik Geelhoed, M...
CHI
2004
ACM
14 years 12 months ago
Deception and design: the impact of communication technology on lying behavior
Social psychology has demonstrated that lying is an important, and frequent, part of everyday social interactions. As communication technologies become more ubiquitous in our dail...
Jeffrey T. Hancock, Jennifer Thom-Santelli, Thomps...
CHI
2004
ACM
14 years 12 months ago
Pointing at trivariate targets in 3D environments
We investigate pointing in true 3D environments where the target size varies in three spatial dimensions. We also study the effect of the user's physical movement angle on po...
Tovi Grossman, Ravin Balakrishnan
CHI
2004
ACM
14 years 12 months ago
"Constant, constant, multi-tasking craziness": managing multiple working spheres
Most current designs of information technology are based on the notion of supporting distinct tasks such as document production, email usage, and voice communication. In this pape...
Gloria Mark, Víctor M. González