Sciweavers

CHI
2006
ACM
14 years 5 months ago
Do security toolbars actually prevent phishing attacks?
Security toolbars in a web browser show security-related information about a website to help users detect phishing attacks. Because the toolbars are designed for humans to use, th...
Min Wu, Robert C. Miller, Simson L. Garfinkel
CHI
2006
ACM
14 years 5 months ago
Synchronous broadcast messaging: the use of ICT
IBM Community Tools (ICT) is a synchronous broadcast messaging system in use by a very large, globally distributed organization. ICT is interesting for a number of reasons, includ...
Justin D. Weisz, Thomas Erickson, Wendy A. Kellogg
CHI
2006
ACM
14 years 5 months ago
Collaborative Coupling over Tabletop Displays
Designing collaborative interfaces for tabletops remains difficult because we do not fully understand how groups coordinate their actions when working collaboratively over tables....
Anthony Tang, Melanie Tory, Barry A. Po, Petra Neu...
CHI
2006
ACM
14 years 5 months ago
Pride and prejudice: learning how chronically ill people think about food
In this paper, we describe a formative study to learn how one chronically ill population thinks about food, mentally organizes food, and interprets consumption-level icons. We fou...
Katie A. Siek, Kay H. Connelly, Yvonne Rogers
CHI
2006
ACM
14 years 5 months ago
Gaze-based interaction for semi-automatic photo cropping
We present an interactive method for cropping photographs given minimal information about the location of important content, provided by eye tracking. Cropping is formulated in a ...
Anthony Santella, Maneesh Agrawala, Douglas DeCarl...
CHI
2006
ACM
14 years 5 months ago
Answering why and why not questions in user interfaces
Modern applications such as Microsoft Word have many automatic features and hidden dependencies that are frequently helpful but can be mysterious to both novice and expert users. ...
Brad A. Myers, David A. Weitzman, Andrew Jensen Ko...
CHI
2006
ACM
14 years 5 months ago
Using hybrid networks for the analysis of online software development communities
Social network-based systems usually suffer from two major limitations: they tend to rely on a single data source (e.g. email traffic), and the form of network patterns is often p...
Yevgeniy Eugene Medynskiy, Nicolas Ducheneaut, Aym...
CHI
2006
ACM
14 years 5 months ago
To have and to hold: exploring the personal archive
The personal archive is not only about efficient storage and retrieval of information. This paper describes a study of forty-eight academics and the techniques and tools they use ...
Joseph Kaye, Janet Vertesi, Shari Avery, Allan Daf...
CHI
2006
ACM
14 years 5 months ago
Direct pointer: direct manipulation for large-display interaction using handheld cameras
This paper describes the design and evaluation of a technique, Direct Pointer, that enables users to interact intuitively with large displays using cameras equipped on handheld de...
Hao Jiang, Eyal Ofek, Neema Moraveji, Yuanchun Shi
CHI
2006
ACM
14 years 5 months ago
The sensual evaluation instrument: developing an affective evaluation tool
In this paper we describe the development and initial testing of a tool for self-assessment of affect while interacting with computer systems: the Sensual Evaluation Instrument. W...
Jarmo Laaksolahti, Katherine Isbister, Kristina H&...