Sciweavers

2648 search results - page 282 / 530
» Human Factors In Computer Security
Sort
View
115
Voted
CHI
2005
ACM
16 years 4 months ago
Understanding email use: predicting action on a message
Email consumes significant time and attention in the workplace. We conducted an organizational survey to understand how and why people attend to incoming email messages. We examin...
Laura A. Dabbish, Robert E. Kraut, Susan R. Fussel...
134
Voted
ACMACE
2009
ACM
15 years 10 months ago
Camera-based interactions for augmented reality
We investigate camera-based interaction techniques suitable for generating simple, easy-to-use augmented reality applications. All the interaction techniques described are based o...
Tatu Harviainen, Otto Korkalo, Charles Woodward
133
Voted
FDG
2009
ACM
15 years 10 months ago
Rhythm-based level generation for 2D platformers
We present a rhythm-based method for the automatic generation of levels for 2D platformers, where the rhythm is that which the player feels with his hands while playing. Levels ar...
Gillian Smith, Mike Treanor, Jim Whitehead, Michae...
179
Voted
MOBIQUITOUS
2008
IEEE
15 years 10 months ago
A multi-dimensional model enabling autonomic reasoning for context-aware pervasive applications
A fundamental requirement for autonomic computing is to be able to automatically infer how human users react in similar contextual conditions. This paper examines the problem of a...
Nearchos Paspallis, Konstantinos Kakousis, George ...
120
Voted
ACMACE
2006
ACM
15 years 9 months ago
How real should virtual characters be?
In recent years 3D virtual characters have become more common in desktop interfaces, particularly in gaming and entertainment applications. In this paper we describe how augmented...
Daniel Wagner, Mark Billinghurst, Dieter Schmalsti...