Sciweavers

2648 search results - page 289 / 530
» Human Factors In Computer Security
Sort
View
169
Voted
MOBISYS
2010
ACM
15 years 6 months ago
CrowdSearch: exploiting crowds for accurate real-time image search on mobile phones
Mobile phones are becoming increasingly sophisticated with a rich set of on-board sensors and ubiquitous wireless connectivity. However, the ability to fully exploit the sensing c...
Tingxin Yan, Vikas Kumar, Deepak Ganesan
HRI
2009
ACM
15 years 1 months ago
Evaluating the ICRA 2008 HRI challenge
This paper reports on the evaluation of the ICRA 2008 Human-Robot Interaction (HRI) Challenge. Five research groups demonstrated state-of-the-art work on HRI with a special focus ...
Astrid Weiss, Thomas Scherndl, Manfred Tscheligi, ...
104
Voted
CHI
2009
ACM
16 years 4 months ago
Can machines call people?: user experience while answering telephone calls initiated by machine
Current state-of?the-art spoken dialog systems are aimed at handling telephone calls to automate incoming caller requests. In this paper we explore a scenario which is symmetric t...
Adam J. Sporka, Jakub Franc, Giuseppe Riccardi
138
Voted
CHI
2010
ACM
15 years 10 months ago
MouseLight: bimanual interactions on digital paper using a pen and a spatially-aware mobile projector
MouseLight is a spatially-aware standalone mobile projector with the form factor of a mouse that can be used in combination with digital pens on paper. By interacting with the pro...
Hyunyoung Song, François Guimbretièr...
120
Voted
CHI
2010
ACM
15 years 10 months ago
Mobile-izing health workers in rural India
Researchers have long been interested in the potential of ICTs to enable positive change in developing regions communities. In these environments, ICT interventions often fail bec...
Divya Ramachandran, John Canny, Prabhu Dutta Das, ...