Sciweavers

CHI
2008
ACM
15 years 27 days ago
Love and authentication
Passwords are ubiquitous, and users and service providers alike rely on them for their security. However, good passwords may sometimes be hard to remember. For years, security pra...
Markus Jakobsson, Erik Stolterman, Susanne Wetzel,...
CHI
2008
ACM
15 years 27 days ago
Explore! possibilities and challenges of mobile learning
Maria Francesca Costabile, Antonella De Angeli, Ro...
CHI
2008
ACM
15 years 27 days ago
Crowdsourcing user studies with Mechanical Turk
User studies are important for many aspects of the design process and involve techniques ranging from informal surveys to rigorous laboratory studies. However, the costs involved ...
Aniket Kittur, Ed H. Chi, Bongwon Suh
CHI
2008
ACM
15 years 27 days ago
MQSearch: image search by multi-class query
Image search is becoming prevalent in web search as the number of digital photos grows exponentially on the internet. For a successful image search system, removing outliers in th...
Yiwen Luo, Wei Liu, Jianzhuang Liu, Xiaoou Tang
CHI
2008
ACM
15 years 27 days ago
Stirring up experience through movement in game play: effects on engagement and social behaviour
The recent development of controllers designed around natural body movements has altered the nature of gaming and contributed towards it being marketed as a more social activity. ...
James Le Couteur, Nadia Berthouze, Siân E. L...
CHI
2008
ACM
15 years 27 days ago
Temporal trajectories in shared interactive narratives
Temporal trajectories can represent the complex mappings between story time and clock time that are to be found in shared interactive narratives such as computer games and interac...
Steve Benford, Gabriella Giannachi
CHI
2008
ACM
15 years 27 days ago
Ingimp: introducing instrumentation to an end-user open source application
Open source projects are gradually incorporating usability methods into their development practices, but there are still many unmet needs. One particular need for nearly any open ...
Michael Terry, Matthew Kay, Brad Van Vugt, Brandon...
CHI
2008
ACM
15 years 27 days ago
Readability of scanned books in digital libraries
Displaying scanned book pages in a web browser is difficult, due to an array of characteristics of the common user's configuration that compound to yield text that is degrade...
Alexander J. Quinn, Chang Hu, Takeshi Arisaka, Ann...
CHI
2008
ACM
15 years 27 days ago
Pick me!: link selection in expertise search results
Expertise locator systems have been designed to help find experts within organizations. While there are many examples of these systems in the literature, there has not been any sy...
N. Sadat Shami, Kate Ehrlich, David R. Millen
CHI
2008
ACM
15 years 27 days ago
Talc: using desktop graffiti to fight software vulnerability
With the proliferation of computer security threats on the Internet, especially threats such as worms that automatically exploit software flaws, it is becoming more and more impor...
Kandha Sankarpandian, Travis Little, W. Keith Edwa...