Sciweavers

CHI
2005
ACM
14 years 8 months ago
Design and evaluation challenges of serious games
As the computer game industry grows, game capabilities and designs are being re-used for purposes other than entertainment. The study of 'Serious Games', i.e. games for ...
Elaine M. Raybourn, Nathan Bos
CHI
2005
ACM
14 years 8 months ago
UXnet: making connections
This position paper for the CHI2005 Development Consortium describes the vision that led to the formation of the User Experience Network (UXnet) and cross-disciplinary needs it ad...
Whitney Quesenbery, Richard Anderson, Beth Mazur
CHI
2005
ACM
14 years 8 months ago
Interrupted cognition and design for non-disruptiveness: the skilled memory approach
Interruptions have gained in importance as a topic in current HCI research. Through a series of experiments, we take a step toward analyzing the active role of human memory in con...
Antti Oulasvirta
CHI
2005
ACM
14 years 8 months ago
A study of preferences for sharing and privacy
We describe studies of preferences about information sharing aimed at identifying fundamental concerns with and at understanding how people might abstract the details of sharing i...
Judith S. Olson, Jonathan Grudin, Eric Horvitz
CHI
2005
ACM
14 years 8 months ago
The future of user interface design tools
This workshop aims to gather researchers in the field of user interface design tools to identify important themes for the next decade of research. These tools aid in the design an...
Dan R. Olsen, Scott R. Klemmer
CHI
2005
ACM
14 years 8 months ago
TxtBoard: from text-to-person to text-to-home
The design of existing mobile phone technology has emphasised the primacy of person-to-person communication for voice, SMS and image-based communication. It may be contrasted with...
Kenton O'Hara, Richard H. R. Harper, Axel Unger, J...
CHI
2005
ACM
14 years 8 months ago
Building security and trust in online banking
Growing threats to online banking security (e.g. phishing, personal identify fraud) and the personal nature of the data make the balance between security, trust and usability vita...
Maria Nilsson, Anne Adams, Simon Herd
CHI
2005
ACM
14 years 8 months ago
The virtuality continuum revisited
We survey the themes and the aims of a workshop devoted to the state-of-the-art virtuality continuum. In this continuum, ranging from fully virtual to real physical environments, ...
Anton Nijholt, David R. Traum
CHI
2005
ACM
14 years 8 months ago
Community source development: an emerging model with new opportunities
This paper focuses on an emerging model for software development in higher education: community source. Community source seeks to blend aspects of both open source and traditional...
Dawn Ressel Nidy, Fong Kwok
CHI
2005
ACM
14 years 8 months ago
PINS push in and POUTS pop out: creating a tangible pin-board that ejects physical documents
There is an asymmetry in many tangible interfaces: while phicons can be used to manipulate digital information, the reverse is often not possible ? the digital world cannot push b...
Kher Hui Ng, Steve Benford, Boriana Koleva