Sciweavers

2648 search results - page 208 / 530
» Human Factors In Computer Security
Sort
View
CHI
2002
ACM
16 years 4 months ago
Head orientation and gaze direction in meetings
Detecting who is looking at whom during multiparty interaction is useful for various tasks such as meeting analysis. There are two contributing factors in the formation of where a...
Rainer Stiefelhagen, Jie Zhu
CHI
2010
ACM
15 years 11 months ago
iCon: utilizing everyday objects as additional, auxiliary and instant tabletop controllers
This work describes a novel approach to utilizing everyday objects of users as additional, auxiliary, and instant tabletop controllers. Based on this approach, a prototype platfor...
Kai-Yin Cheng, Rong-Hao Liang, Bing-Yu Chen, Rung-...
CHI
2010
ACM
15 years 11 months ago
Cord input: an intuitive, high-accuracy, multi-degree-of-freedom input method for mobile devices
A cord, although simple in form, has many interesting physical affordances that make it powerful as an input device. Not only can a length of cord be grasped in different location...
Julia Schwarz, Chris Harrison, Scott E. Hudson, Je...
CHI
2010
ACM
15 years 11 months ago
Blowing in the wind: unanchored patient information work during cancer care
Patients do considerable information work. Technologies that help patients manage health information so they can play active roles in their health-care, such as personal health re...
Predrag V. Klasnja, Andrea Civan-Hartzler, Kenton ...
CHI
2010
ACM
15 years 11 months ago
The effect of audience design on labeling, organizing, and finding shared files
In an online experiment, I apply theory from psychology and communications to find out whether group information management tasks are governed by the same communication processes...
Emilee Rader