Sciweavers

2564 search results - page 252 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
131
Voted
CHI
2004
ACM
16 years 4 months ago
MouthType: text entry by hand and mouth
In this paper we describe a novel text entry method which uses coordinated motor action of hand and mouth. A vision based algorithm is used to gauge shape parameters of the cavity...
Michael J. Lyons, Chi-Ho Chan, Nobuji Tetsutani
CHI
2004
ACM
16 years 4 months ago
24/7 or bust: designing for the challenges of global UCD
The globalization of Oracle's development organization, customer base, and product lines has had an ongoing impact on the evolution of the Oracle UI Group (OUI). It has chang...
Dan Rosenberg, Uday Gajendar
CHI
2003
ACM
16 years 4 months ago
Refining Fitts' law models for bivariate pointing
We investigate bivariate pointing in light of the recent progress in the modeling of univariate pointing. Unlike previous studies, we focus on the effect of target shape (width an...
Johnny Accot, Shumin Zhai
132
Voted
CHI
2002
ACM
16 years 4 months ago
An ordering of secondary task display attributes
We found that established display design guidelines for focal images cannot be extended to images displayed as a secondary task in a dual-task situation. This paper describes an e...
David Tessendorf, Christa M. Chewar, Ali Ndiwalana...
CHI
2010
ACM
15 years 10 months ago
A case study of micro-blogging in the enterprise: use, value, and related issues
This is a case study about the early adoption and use of micro-blogging in a Fortune 500 company. The study used several independent data sources: five months of empirical micro-b...
Jun Zhang, Yan Qu, Jane Cody, Yulingling Wu