Sciweavers

2250 search results - page 151 / 450
» Authorizing applications in singularity
Sort
View
CHI
2006
ACM
15 years 10 months ago
Design and experimental analysis of continuous location tracking techniques for Wizard of Oz testing
Wizard of Oz (WOz) testing has shown promise as an effective way to test location-enhanced applications. However, it is challenging to conduct a location-based WOz test because of...
Yang Li, Evan Welbourne, James A. Landay
CHI
2005
ACM
15 years 10 months ago
Evaluation of alternative presentation control techniques
Although slideshow presentation applications, such as PowerPointTM have been popular for years, the techniques commercially available to control them rely on mouse and keyboard, w...
Xiang Cao, Eyal Ofek, David Vronay
SIGMOD
2004
ACM
160views Database» more  SIGMOD 2004»
15 years 10 months ago
Extending Query Rewriting Techniques for Fine-Grained Access Control
Current day database applications, with large numbers of users, require fine-grained access control mechanisms, at the level of individual tuples, not just entire relations/views,...
Shariq Rizvi, Alberto O. Mendelzon, S. Sudarshan, ...
CSCW
2010
ACM
15 years 7 months ago
Characteristics of shared health reflections in a local community
We performed a content analysis of the information shared in a locally and culturally focused health application, EatWell. In EatWell, information is shared via the creation of au...
Andrea Grimes, Brian M. Landry, Rebecca E. Grinter
CHI
2010
ACM
15 years 5 months ago
Avaaj Otalo: a field study of an interactive voice forum for small farmers in rural India
In this paper we present the results of a field study of Avaaj Otalo (literally, “voice stoop”), an interactive voice application for small-scale farmers in Gujarat, India. T...
Neil Patel, Deepti Chittamuru, Anupam Jain, Paresh...