Sciweavers

143 search results - page 4 / 29
» Context-sensitive authorization in interaction patterns
Sort
View
CHI
2007
ACM
15 years 10 months ago
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing
As sharing personal media online becomes easier and widely spread, new privacy concerns emerge ? especially when the persistent nature of the media and associated context reveals ...
Shane Ahern, Dean Eckles, Nathaniel Good, Simon Ki...
CHI
2005
ACM
15 years 10 months ago
Conversing with the user based on eye-gaze patterns
Motivated by and grounded in observations of eye-gaze patterns in human-human dialogue, this study explores using eye-gaze patterns in managing human-computer dialogue. We develop...
Pernilla Qvarfordt, Shumin Zhai
CHI
2008
ACM
15 years 10 months ago
Large scale analysis of web revisitation patterns
Our work examines Web revisitation patterns. Everybody revisits Web pages, but their reasons for doing so can differ depending on the particular Web page, their topic of interest,...
Eytan Adar, Jaime Teevan, Susan T. Dumais
CHI
2008
ACM
15 years 10 months ago
Aligning temporal data by sentinel events: discovering patterns in electronic health records
Electronic Health Records (EHRs) and other temporal databases contain hidden patterns that reveal important cause-and-effect phenomena. Finding these patterns is a challenge when ...
Taowei David Wang, Catherine Plaisant, Alexander J...
89
Voted
ICSM
2003
IEEE
15 years 2 months ago
Software Architecture Recovery based on Pattern Matching
This paper is a summary of the author’s thesis that presents a model and an environment for recovering the high level design of legacy software systems based on user defined ar...
Kamran Sartipi