In this work, we introduce the use of tags to support the near synchronous use of instant messaging (IM). As a proof-of-concept, we developed a plug-in in Lotus Sametime, an enter...
Gary Hsieh, Jennifer Lai, Scott E. Hudson, Robert ...
We designed and iterated on a photo browsing application for high-end mobile phones. The application, Zurfer, supports viewing of photos from the user, their contacts, and the gen...
For decades, Fitts' law (1954) has been used to model pointing time in user interfaces. As with any rapid motor act, faster pointing movements result in increased errors. But...
Jacob O. Wobbrock, Edward Cutrell, Susumu Harada, ...
To understand how and why individuals make use of emerging information assimilation services on the Web as part of their daily routine, we combined video recordings of online acti...
This paper presents a context-aware mobile recommender system, codenamed Magitti. Magitti is unique in that it infers user activity from context and patterns of user behavior and,...
Victoria Bellotti, James Bo Begole, Ed Huai-hsin C...
It is well established that there is a need to find experts to get answers or advice. A variety of expertise locator tools have emerged to help locate the right person. But there ...
Peephole interaction occurs when a spatially aware display is moved and acts as a viewport to reveal different parts of the virtual space that cannot all fit within the display at...
We propose the "ninja cursor" to improve the performance of target acquisition, particularly on large screens. This technique uses multiple distributed cursors to reduce...
Although both statistical methods and visualizations have been used by network analysts, exploratory data analysis remains a challenge. We propose that a tight integration of thes...