Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
With the rapid growth of personal computer networks and the Internet, sharing files has become a central activity in computer use. The ways in which users control the what, how, a...
Stephen Voida, W. Keith Edwards, Mark W. Newman, R...
HCI evaluation methods are useful for improving the design of interactive systems, yet they may be rejected by nontraditional technology disciplines such as media art. We have dev...
Automatic camera control for scenes depicting human motion is an imperative topic in motion capture base animation, computer games, and other animation based fields. This challen...
People use a wide range of intensity when interacting with computers, spanning from subtle to brute force. However, computer interfaces so far have mainly focused on interactions ...
Florian Mueller, Stefan Agamanolis, Frank Vetere, ...