Sciweavers

122 search results - page 19 / 25
» Experiments in Human Multi-Issue Negotiation: Analysis and S...
Sort
View
CHI
2005
ACM
16 years 3 days ago
Beyond being in the lab: using multi-agent modeling to isolate competing hypotheses
In studies of virtual teams, it is difficult to determine pure effects of geographic isolation and uneven communication technology. We developed a multi-agent computer model in Ne...
Ning Nan, Erik W. Johnston, Judith S. Olson, Natha...
CHI
2007
ACM
15 years 3 months ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
CHI
2006
ACM
16 years 3 days ago
The validity of the stimulated retrospective think-aloud method as measured by eye tracking
Retrospective Think aloud (RTA) is a usability method that collects the verbalization of a user's performance after the performance is over. There has been little work done t...
Zhiwei Guan, Shirley Lee, Elisabeth Cuddihy, Judit...
CHI
2005
ACM
16 years 3 days ago
What is connected by mutual gaze?: user's behavior in video-mediated communication
Video-mediated communication systems such as teleconferencing and videophone have become popular. As with face-to-face communication, non-verbal cues such as gaze, facial expressi...
Naoki Mukawa, Tsugumi Oka, Kumiko Arai, Masahide Y...
ICPR
2010
IEEE
15 years 6 months ago
Canonical Patterns of Oriented Topologies
—A common problem in many areas of behavioral research is the analysis of the large volume of data recorded during the execution of the tasks being studied. Recent work has propo...
Walter Mankowski, Ali Shokoufandeh, Dario Salvucci