Sciweavers

2021 search results - page 274 / 405
» Energy-aware user interfaces: an evaluation of user acceptan...
Sort
View
CSCW
2008
ACM
14 years 11 months ago
Social networks and context-aware spam
Social networks are popular for online communities. This paper evaluates the risk of sophisticated context-aware spam that could result from information sharing on social networks...
Garrett Brown, Travis Howe, Micheal Ihbe, Atul Pra...
CHI
2011
ACM
14 years 1 months ago
PaperPhone: understanding the use of bend gestures in mobile devices with flexible electronic paper displays
Flexible displays potentially allow for interaction styles that resemble those used in paper documents. Bending the display, e.g., to page forward, shows particular promise as an ...
Byron Lahey, Audrey Girouard, Winslow Burleson, Ro...
IUI
2010
ACM
15 years 4 months ago
Intelligent understanding of handwritten geometry theorem proving
Computer-based geometry systems have been widely used for teaching and learning, but largely based on mouse-andkeyboard interaction, these systems usually require users to draw fi...
Yingying Jiang, Feng Tian, Hongan Wang, Xiaolong Z...
UIST
2010
ACM
14 years 7 months ago
Enhanced area cursors: reducing fine pointing demands for people with motor impairments
Computer users with motor impairments face major challenges with conventional mouse pointing. These challenges are mostly due to fine pointing corrections at the final stages of t...
Leah Findlater, Alex Jansen, Kristen Shinohara, Mo...
ASWEC
2006
IEEE
15 years 4 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...