Sciweavers

2648 search results - page 162 / 530
» Human Factors In Computer Security
Sort
View
CHI
2010
ACM
15 years 2 months ago
The life and times of files and information: a study of desktop provenance
In the field of Human-Computer Interaction, provenance refers to the history and genealogy of a document or file. Provenance helps us to understand the evolution and relationships...
Carlos Jensen, Heather Lonsdale, Eleanor Wynn, Jil...
113
Voted
ITICSE
2006
ACM
15 years 10 months ago
A web-based service for the automatic detection of roles of variables
Learning elementary programming can be enhanced by introducing the notion of variable roles to students. This paper presents a web-based automatic role detection service that can ...
Petri Gerdt, Jorma Sajaniemi
165
Voted
ICONFERENCE
2012
14 years 14 days ago
Online social networks in a post-Soviet state: how Hungarians protect and share on Facebook
As Facebook has become global, users from different cultural and socio-political contexts have joined the site. We present a case study investigating how both current and historic...
Blase Ur, Yang Wang
HRI
2007
ACM
15 years 8 months ago
Managing autonomy in robot teams: observations from four experiments
It is often desirable for a human to manage multiple robots. Autonomy is required to keep workload within tolerable ranges, and dynamically adapting the type of autonomy may be us...
Michael A. Goodrich, Timothy W. McLain, Jeffrey D....
CHI
2011
ACM
14 years 8 months ago
Bricolage: example-based retargeting for web design
The Web provides a corpus of design examples unparalleled in human history. However, leveraging existing designs to produce new pages is often difficult. This paper introduces th...
Ranjitha Kumar, Jerry O. Talton, Salman Ahmad, Sco...