Sciweavers

2648 search results - page 300 / 530
» Human Factors In Computer Security
Sort
View
126
Voted
UIST
1995
ACM
15 years 7 months ago
Migratory Applications
We introduce a new genre of user interface applications that can migrate from one machine to another, taking their user interface and application contexts with them, and continue ...
Krishna Bharat, Luca Cardelli
ATAL
2008
Springer
15 years 5 months ago
The intermediary agent's brain: supporting learning to collaborate at the inter-personal level
We discuss the design of the Intermediary Agent's brain, the control module of an embodied conversational virtual peer in a simulation game aimed at providing learning experi...
Juan Martínez-Miranda, Bernhard Jung, Sabin...
120
Voted
CHI
2008
ACM
15 years 5 months ago
Genetic algorithm can optimize hierarchical menus
Hierarchical menus are now ubiquitous. The performance of the menu depends on many factors: structure, layout, colors and so on. There has been extensive research on novel menus, ...
Shouichi Matsui, Seiji Yamada
119
Voted
CHI
2008
ACM
15 years 5 months ago
Comparing access methods and quality of 3g mobile video streaming services
In this paper we examine the access methods and the quality of experience of current unicast video streaming services in 3G mobile networks. A packet-switched mobile video client,...
Marcin Davies, Antitza Dantcheva, Peter Fröhl...
119
Voted
DSVIS
2008
Springer
15 years 5 months ago
Resources for Situated Actions
In recent years, advances in software tools have made it easier to analyze interactive system specifications, and the range of their possible behaviors. However, the effort involve...
Gavin J. Doherty, José Creissac Campos, Mic...