Sciweavers

2648 search results - page 138 / 530
» Human Factors In Computer Security
Sort
View
CHI
2010
ACM
15 years 7 months ago
Graaasp: a web 2.0 research platform for contextual recommendation with aggregated data
In this paper we describe Graaasp, a social software currently under development to support the creation of a real usage database of social artifacts. Our goals are twofold: First...
Evgeny Bogdanov, Sandy El Helou, Denis Gillet, Chr...
149
Voted
CHI
2011
ACM
14 years 8 months ago
From the lab to the world: lessons from extending a pointing technique for real-world use
We present the Pointing Magnifier as a case study for understanding the issues and challenges of deploying lab-validated pointing facilitation techniques into the real world. The ...
Alex Jansen, Leah Findlater, Jacob O. Wobbrock
ICC
2008
IEEE
134views Communications» more  ICC 2008»
15 years 11 months ago
Secret Little Functions and Codebook for Protecting Users from Password Theft
—In this paper, we discuss how to prevent users’ passwords from being stolen by adversaries. We propose differentiated security mechanisms in which a user has the freedom to ch...
Yang Xiao, Chung-Chih Li, Ming Lei, Susan V. Vrbsk...
ICCS
2007
Springer
15 years 11 months ago
Learning Common Outcomes of Communicative Actions Represented by Labeled Graphs
We build a generic methodology based on learning and reasoning to detect specific attitudes of human agents and patterns of their interactions. Human attitudes are determined in te...
Boris Galitsky, Boris Kovalerchuk, Sergei O. Kuzne...
171
Voted
CHI
2010
ACM
15 years 1 months ago
Connect 2 congress: visual analytics for civic oversight
Strong representative democracies rely on educated, informed, and active citizenry to provide oversight of the government. We present Connect 2 Congress (C2C), a novel, high tempo...
Peter Kinnaird, Mario Romero, Gregory D. Abowd