Sciweavers

2648 search results - page 227 / 530
» Human Factors In Computer Security
Sort
View
CHI
2008
ACM
16 years 4 months ago
LiveRAC: interactive visual exploration of system management time-series data
We present LiveRAC, a visualization system that supports the analysis of large collections of system management timeseries data consisting of hundreds of parameters across thousan...
Peter McLachlan, Tamara Munzner, Eleftherios Kouts...
CHI
2008
ACM
16 years 4 months ago
Multi-flick: an evaluation of flick-based scrolling techniques for pen interfaces
Multi-flick, which consists of repeated flick actions, has received media attention as an intuitive and natural document-scrolling technique for stylus based systems. In this pape...
Dzmitry Aliakseyeu, Pourang Irani, Andrés L...
CHI
2007
ACM
16 years 4 months ago
Pressure marks
Selections and actions in GUI's are often separated ? i.e. an action or command typically follows a selection. This sequence imposes a lower bound on the interaction time tha...
Gonzalo A. Ramos, Ravin Balakrishnan
CHI
2007
ACM
16 years 4 months ago
Bubbling menus: a selective mechanism for accessing hierarchical drop-down menus
This paper introduces bubbling menus, a new design for cascading drop-down menus. Bubbling menus combine the bubble cursor [10] with directional mouse-gesture techniques to facili...
Theophanis Tsandilas, m. c. schraefel
CHI
2006
ACM
16 years 4 months ago
Biasing response in Fitts' Law tasks
Fitts' law, relating the time to acquire a target to the target size and the distance from the target, is an effective and widely used predictor of performance in feedback co...
Emory Al-Imam, Edward Lank