Sciweavers

10689 search results - page 193 / 2138
» How informances can be used in design ethnography
Sort
View
ACSAC
2010
IEEE
14 years 9 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...
CSCW
2011
ACM
14 years 5 months ago
(Whose) value-sensitive design: a study of long- distance relationships in an Arabic cultural context
This paper describes a qualitative study of how 11 Arab individuals use technology in the context of their longdistance romantic relationships. Our participants’ communication p...
Tamara Alsheikh, Jennifer A. Rode, Siân E. L...
CHI
2008
ACM
15 years 11 months ago
Ninja cursors: using multiple cursors to assist target acquisition on large screens
We propose the "ninja cursor" to improve the performance of target acquisition, particularly on large screens. This technique uses multiple distributed cursors to reduce...
Masatomo Kobayashi, Takeo Igarashi
100
Voted
DEXAW
2002
IEEE
91views Database» more  DEXAW 2002»
15 years 3 months ago
Using Digital Narratives to Support the Collaborative Learning and Exploration of Cultural Heritage
Cultural institutions increasingly see the need to play an important role in the lifelong learning of citizens. Recent trends, particularly in science museums, have been toward su...
Paul Mulholland, Trevor D. Collins
110
Voted
CAISE
1998
Springer
15 years 3 months ago
OMS/Java: Model Extensibility of OODBMS for Advanced Application Domains
We show how model extensibility of object-oriented data management systems can be achieved through the combination of a highlevel core object data model and an architecture designe...
Andreas Steiner, Adrian Kobler, Moira C. Norrie