Sciweavers

2648 search results - page 144 / 530
» Human Factors In Computer Security
Sort
View
CHI
2010
ACM
15 years 12 months ago
A case study of micro-blogging in the enterprise: use, value, and related issues
This is a case study about the early adoption and use of micro-blogging in a Fortune 500 company. The study used several independent data sources: five months of empirical micro-b...
Jun Zhang, Yan Qu, Jane Cody, Yulingling Wu
CHI
2010
ACM
15 years 11 months ago
Video microblogging: your 12 seconds of fame
Microblogging is a recently popular phenomenon and with the increasing trend for video cameras to be built into mobile phones, a new type of microblogging has entered the arena of...
Nis Bornoe, Louise Barkhuus
155
Voted
CHI
2010
ACM
15 years 11 months ago
Graphemes: self-organizing shape-based clustered structures for network visualisations
Network visualisations use clustering approaches to simplify the presentation of complex graph structures. We present a novel application of clustering algorithms, which controls ...
Ross Shannon, Aaron J. Quigley, Paddy Nixon
CHI
2010
ACM
15 years 11 months ago
MotionBeam: designing for movement with handheld projectors
In this paper we present a novel interaction metaphor for handheld projectors we label MotionBeam. We detail a number of interaction techniques that utilize the physical movement ...
Karl D. D. Willis, Ivan Poupyrev
HRI
2009
ACM
15 years 11 months ago
Creating and using matrix representations of social interaction
This paper explores the use of an outcome matrix as a computational representation of social interaction suitable for implementation on a robot. An outcome matrix expresses the re...
Alan R. Wagner