Sciweavers

2648 search results - page 303 / 530
» Human Factors In Computer Security
Sort
View
165
Voted
CVPR
2012
IEEE
13 years 6 months ago
Multi-view latent variable discriminative models for action recognition
Many human action recognition tasks involve data that can be factorized into multiple views such as body postures and hand shapes. These views often interact with each other over ...
Yale Song, Louis-Philippe Morency, Randall Davis
CHI
2009
ACM
16 years 4 months ago
Tilt techniques: investigating the dexterity of wrist-based input
Most studies on tilt based interaction can be classified as point-designs that demonstrate the utility of wrist-tilt as an input medium; tilt parameters are tailored to suit the s...
Mahfuz Rahman, Sean Gustafson, Pourang Irani, Srir...
CHI
2009
ACM
16 years 4 months ago
Product interest and engagement scale, beta (pies-beta): initial development
We report a work in progress: development and initial validation of the Product Interest and Engagement Scale (PIES), a short assessment instrument measuring consumer interest in ...
Christopher N. Chapman, Michal Lahav, Edwin Love, ...
139
Voted
MOBISYS
2009
ACM
16 years 4 months ago
A methodology for extracting temporal properties from sensor network data streams
The extraction of temporal characteristics from sensor data streams can reveal important properties about the sensed events. Knowledge of temporal characteristics in applications ...
Dimitrios Lymberopoulos, Athanasios Bamis, Andreas...
117
Voted
CHI
2008
ACM
16 years 4 months ago
Pick me!: link selection in expertise search results
Expertise locator systems have been designed to help find experts within organizations. While there are many examples of these systems in the literature, there has not been any sy...
N. Sadat Shami, Kate Ehrlich, David R. Millen