Sciweavers

CHI
2008
ACM
15 years 27 days ago
Human-aided computing: utilizing implicit human processing to classify images
In this paper, we present Human-Aided Computing, an approach that uses an electroencephalograph (EEG) device to measure the presence and outcomes of implicit cognitive processing,...
Pradeep Shenoy, Desney S. Tan
CHI
2008
ACM
15 years 27 days ago
MySong: automatic accompaniment generation for vocal melodies
We introduce MySong, a system that automatically chooses chords to accompany a vocal melody. A user with no musical experience can create a song with instrumental accompaniment ju...
Ian Simon, Dan Morris, Sumit Basu
CHI
2008
ACM
15 years 27 days ago
Children attribute moral standing to a personified agent
This paper describes the results of a study conducted to answer two questions: (1) Do children generalize their understanding of distinctions between conventional and moral violat...
Nathan G. Freier
CHI
2008
ACM
15 years 27 days ago
Access control by testing for shared knowledge
Controlling the privacy of online content is difficult and often confusing. We present a social access control where users devise simple questions of shared knowledge instead of c...
Michael Toomim, Xianhang Zhang, James Fogarty, Jam...
CHI
2008
ACM
15 years 27 days ago
Designs on dignity: perceptions of technology among the homeless
Technology, it is argued, has the potential to improve everyone's life: from the workplace, to entertainment, to easing chores around the home. But what of people who have ne...
Christopher A. Le Dantec, W. Keith Edwards
CHI
2008
ACM
15 years 27 days ago
MightyTrace: multiuser tracking technology on lc-displays
In this paper, we present a new technology to perform multi Tangible User Interface (TUI) tracking on standard LCdisplays. A lot of existing technologies for tangible user interfa...
Ramon Hofer, Patrick Kaplan, Andreas Kunz
CHI
2008
ACM
15 years 27 days ago
Assessing attractiveness in online dating profiles
Online dating systems play a prominent role in the social lives of millions of their users, but little research has considered how users perceive one another through their persona...
Andrew T. Fiore, Lindsay Shaw Taylor, G. A. Mendel...
CHI
2008
ACM
15 years 27 days ago
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
Many popular web browsers now include active phishing warnings since research has shown that passive warnings are often ignored. In this laboratory study we examine the effectiven...
Serge Egelman, Lorrie Faith Cranor, Jason I. Hong
CHI
2008
ACM
15 years 27 days ago
Activity sensing in the wild: a field trial of ubifit garden
Recent advances in small inexpensive sensors, low-power processing, and activity modeling have enabled applications that use on-body sensing and machine learning to infer people&#...
Sunny Consolvo, David W. McDonald, Tammy Toscos, M...
CHI
2008
ACM
15 years 27 days ago
Understanding geocaching practices and motivations
Geocaching is a location-based activity that has been practiced for a number of years. As a sustained and established activity it represents an important opportunity for understan...
Kenton O'Hara