Sciweavers

2648 search results - page 122 / 530
» Human Factors In Computer Security
Sort
View
CHI
2011
ACM
14 years 8 months ago
The aligned rank transform for nonparametric factorial analyses using only anova procedures
Nonparametric data from multi-factor experiments arise often in human-computer interaction (HCI). Examples may include error counts, Likert responses, and preference tallies. But ...
Jacob O. Wobbrock, Leah Findlater, Darren Gergle, ...
NBIS
2007
Springer
15 years 11 months ago
Trust Model for Mobile Devices in Ubiquitous Environment
In ubiquitous computing environment, people carrying their mobile devices (eg., mobile phone, PDA, embedded devices) expect to access locally hosted services or resources anytime, ...
Zhefan Jiang, Sangwook Kim
CHI
2010
ACM
15 years 12 months ago
Lightweight selective availability in instant messaging
Selective availability in instant messaging can improve connectiveness while at the same time keeping disruption low. In this paper we report on an experience sampling study of se...
Mirko Fetter, Julian Seifert, Tom Gross
ACMACE
2007
ACM
15 years 9 months ago
Playing with your brain: brain-computer interfaces and games
In this workshop we investigate a possible role of brain-computer interaction in computer games and entertainment computing. The assumption is that brain activity, whether it is c...
Anton Nijholt, Desney S. Tan
122
Voted
ACMIDC
2009
15 years 9 months ago
Jots: reflective learning in scratch
This paper presents early work on the "Jots" system, integrated with the Scratch programming environment, which aims to help learners reflect on their learning processes...
Eric Rosenbaum