Sciweavers

CHI
2009
ACM
13 years 11 months ago
Hyperlinking reality via camera phones
Mobile vision services are a type of mobile ITS applications that emerge with increased miniaturization of sensor and computing devices, such as in camera equipped mobile phones, ...
Dusan Omercevic, Ales Leonardis
CHI
2009
ACM
13 years 11 months ago
Yours, mine and (not) ours: social influences on group information repositories
Group information repositories are systems for storing and organizing files in a central location all group members can access. The functionality and capabilities of these systems...
Emilee Rader
CHI
2009
ACM
13 years 11 months ago
A comparison of mobile money-transfer UIs for non-literate and semi-literate users
Due to the increasing penetration of mobile phones even into poor communities, mobile payment schemes could bring formal financial services to the "unbanked". However, b...
Indrani Medhi, S. N. Nagasena Gautama, Kentaro Toy...
CHINZ
2007
ACM
13 years 11 months ago
Using a mobile phone for 6 DOF mesh editing
This paper describes how a mobile phone can be used as a six degree of freedom interaction device for 3D mesh editing. Using a video see-through Augmented Reality approach, the mo...
Anders Henrysson, Mark Billinghurst
CHINZ
2007
ACM
13 years 11 months ago
Users dealing with spam and spam filters: some observations and recommendations
The email communication system is threatened by unsolicited commercial email aka spam. In response, spam filters have been deployed widely to help reduce the amount of spam users ...
Christopher Lueg, Sam Martin
CHINZ
2007
ACM
13 years 11 months ago
Evaluation of spatial abilities through tabletop AR
Research has been done into improving the means by which we organise and manage information. The usefulness of 2D versus 3D interfaces and environments has also been debated and e...
Moffat Mathews, Madan Challa, Cheng-Tse Chu, Gu Ji...
CHIMIT
2007
ACM
13 years 11 months ago
Design guidelines for system administration tools developed through ethnographic field studies
Information Technology system administrators (sysadmins) perform the crucial and never-ending work of maintaining the technical infrastructure on which our society depends. Comput...
Eben M. Haber, John H. Bailey
CHIMIT
2007
ACM
13 years 11 months ago
Activity-based management of IT service delivery
Growth, adaptability, innovation, and cost control are leading concerns of businesses, especially with respect to use of information technology (IT). Though standards such as the ...
John H. Bailey, Eser Kandogan, Eben M. Haber, Paul...
CHIMIT
2007
ACM
13 years 11 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson