Sciweavers

2648 search results - page 156 / 530
» Human Factors In Computer Security
Sort
View
WWW
2011
ACM
14 years 12 months ago
A case for query by image and text content: searching computer help using screenshots and keywords
The multimedia information retrieval community has dedicated extensive research effort to the problem of content-based image retrieval (CBIR). However, these systems find their ma...
Tom Yeh, Brandyn White, Jose San Pedro, Boris Katz...
WWW
2009
ACM
16 years 5 months ago
Computers and iphones and mobile phones, oh my!: a logs-based comparison of search users on different devices
We present a logs-based comparison of search patterns across three platforms: computers, iPhones and conventional mobile phones. Our goal is to understand how mobile search users ...
Maryam Kamvar, Melanie Kellar, Rajan Patel, Ya Xu
WWW
2003
ACM
16 years 5 months ago
SHOCK: communicating with computational messages and automatic private profiles
A computationally enhanced message contains some embedded programmatic components that are interpreted and executed automatically upon receipt. Unlike ordinary text email or insta...
Rajan M. Lukose, Eytan Adar, Joshua R. Tyler, Caes...
ACMACE
2005
ACM
15 years 10 months ago
Achieving fairness in multiplayer network games through automated latency balancing
Over the past few years, the prominence of multiplayer network gaming has increased dramatically in the Internet. The effect of network delay (lag) on multiplayer network gaming h...
Sebastian Zander, Ian Leeder, Grenville J. Armitag...
APCHI
1998
IEEE
15 years 9 months ago
Features of Eye Gaze Interface for Selection Tasks
Eye gaze interface has potential as a new HumanComputerInteractionmethod, evidentin the numerouskinds developed so far. However, in order to make sure that such an interface is bo...
Takehiko Ohno