Sciweavers

2648 search results - page 234 / 530
» Human Factors In Computer Security
Sort
View
CHI
2010
ACM
15 years 11 months ago
Supporting sandtray therapy on an interactive tabletop
We present the iterative design of a virtual sandtray application for a tabletop display. The purpose of our prototype is to support sandtray therapy, a form of art therapy typica...
Mark S. Hancock, Thomas ten Cate, M. Sheelagh T. C...
CHI
2010
ACM
15 years 11 months ago
Useful junk?: the effects of visual embellishment on comprehension and memorability of charts
Guidelines for designing information charts often state that the presentation should reduce ‗chart junk‘ – visual embellishments that are not essential to understanding the ...
Scott Bateman, Regan L. Mandryk, Carl Gutwin, Aaro...
CHI
2010
ACM
15 years 11 months ago
Sharing conversation and sharing life: video conferencing in the home
Video conferencing is a technology that families and friends use to connect with each other over distance. However, even with such technology readily available, we still do not ha...
Tejinder K. Judge, Carman Neustaedter
CHI
2010
ACM
15 years 11 months ago
A strategy-centric approach to the design of end-user debugging tools
End-user programmers’ code is notoriously buggy. This problem is amplified by the increasing complexity of end users’ programs. To help end users catch errors early and reliab...
Valentina Grigoreanu, Margaret M. Burnett, George ...
CHI
2010
ACM
15 years 11 months ago
Prefab: implementing advanced behaviors using pixel-based reverse engineering of interface structure
Current chasms between applications implemented with different user interface toolkits make it difficult to implement and explore potentially important interaction techniques in n...
Morgan Dixon, James Fogarty