Sciweavers

2648 search results - page 239 / 530
» Human Factors In Computer Security
Sort
View
CHI
2010
ACM
15 years 11 months ago
Characterizing debate performance via aggregated twitter sentiment
Television broadcasters are beginning to combine social micro-blogging systems such as Twitter with television to create social video experiences around events. We looked at one s...
Nicholas Diakopoulos, David A. Shamma
CHI
2010
ACM
15 years 11 months ago
ToolClips: an investigation of contextual video assistance for functionality understanding
We investigate the use of on-line contextual video assistance to improve the learnability of software functionality. After discussing motivations and design goals for such forms o...
Tovi Grossman, George W. Fitzmaurice
CHI
2010
ACM
15 years 11 months ago
Code bubbles: a working set-based interface for code understanding and maintenance
Developers spend significant time reading and navigating code fragments spread across multiple locations. The filebased nature of contemporary IDEs makes it prohibitively difficul...
Andrew Bragdon, Robert C. Zeleznik, Steven P. Reis...
CHI
2010
ACM
15 years 11 months ago
After access: challenges facing mobile-only internet users in the developing world
This study reports results of an ethnographic action research study, exploring mobile-centric internet use. Over the course of 13 weeks, eight women, each a member of a livelihood...
Shikoh Gitau, Gary Marsden, Jonathan Donner
CHI
2010
ACM
15 years 11 months ago
Effects of interior bezels of tiled-monitor large displays on visual search, tunnel steering, and target selection
Tiled-monitor large displays are widely used in various application domains. However, how their interior bezels affect user performance and behavior has not been fully understood....
Xiaojun Bi, Seok-Hyung Bae, Ravin Balakrishnan