Sciweavers

7405 search results - page 1313 / 1481
» Computer Graphics
Sort
View
CHI
2008
ACM
15 years 10 months ago
Undercover: authentication usable in front of prying eyes
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi
67
Voted
CHI
2008
ACM
15 years 10 months ago
Generalized selection via interactive query relaxation
Selection is a fundamental task in interactive applications, typically performed by clicking or lassoing items of interest. However, users may require more nuanced forms of select...
Jeffrey Heer, Maneesh Agrawala, Wesley Willett
94
Voted
CHI
2007
ACM
15 years 10 months ago
Voyagers and voyeurs: supporting asynchronous collaborative information visualization
This paper describes mechanisms for asynchronous collaboration in the context of information visualization, recasting visualizations as not just analytic tools, but social spaces....
Jeffrey Heer, Fernanda B. Viégas, Martin Wa...
CHI
2007
ACM
15 years 10 months ago
A motion-based marking menu system
The rapid development of handheld devices is driving the development of new interaction styles. This paper examines one such technique: using hand motions to control a menu system...
Ian Oakley, Junseok Park
78
Voted
CHI
2006
ACM
15 years 10 months ago
Answering why and why not questions in user interfaces
Modern applications such as Microsoft Word have many automatic features and hidden dependencies that are frequently helpful but can be mysterious to both novice and expert users. ...
Brad A. Myers, David A. Weitzman, Andrew Jensen Ko...
« Prev « First page 1313 / 1481 Last » Next »