Sciweavers

2648 search results - page 126 / 530
» Human Factors In Computer Security
Sort
View
141
Voted
ESOP
2005
Springer
15 years 10 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
ICPR
2004
IEEE
16 years 6 months ago
Maximizing Validity in 2D Motion Analysis
Classifying and analyzing human motion from a video is relatively common in many areas. Since the motion is carried out in 3D space, the 2D projection provided by a video is somew...
Martin Eriksson, Stefan Carlsson
CHI
2009
ACM
16 years 5 months ago
User experience evaluation: do you know which method to use?
High quality user experience (UX) has become a central competitive factor of product development in mature consumer markets. Although the term UX is widely used, the methods and t...
Marianna Obrist, Virpi Roto, Kaisa Vään&...
CHI
2002
ACM
16 years 5 months ago
Evaluating pattern languages in participatory design
We present an evaluation of pattern languages as tools for participatory design, based on three criteria, derived from the work of Christopher Alexander: empowering users, generat...
Andy Dearden, Janet Finlay, Liz Allgar, Barbara Mc...
CHI
2002
ACM
16 years 5 months ago
Gaze behavior of talking faces makes a difference
We present the results of an experiment investigating the effects of a talking head's gaze behavior on the user's quality assessment of the interface. We compared a vers...
Ivo van Es, Dirk Heylen, Betsy van Dijk, Anton Nij...