Sciweavers

2648 search results - page 305 / 530
» Human Factors In Computer Security
Sort
View
114
Voted
CHI
1999
ACM
15 years 8 months ago
Exploring Bimanual Camera Control and Object Manipulation in 3D Graphics Interfaces
We explore the use of the non-dominant hand to control a virtual camera while the dominant hand performs other tasks in a virtual 3D scene. Two experiments and an informal study a...
Ravin Balakrishnan, Gordon Kurtenbach
121
Voted
CHI
1999
ACM
15 years 8 months ago
Time-Compression: Systems Concerns, Usage, and Benefits
With the proliferation of online multimedia content and the popularity of multimedia streaming systems, it is increasingly useful to be able to skim and browse multimedia quickly....
Nosa Omoigui, Liwei He, Anoop Gupta, Jonathan Grud...
CHI
2010
ACM
15 years 5 months ago
The family window: the design and evaluation of a domestic media space
Families have a strong need to connect with their loved ones over distance. However, most technologies do not provide the same feelings of connectedness that one feels from seeing...
Tejinder K. Judge, Carman Neustaedter, Andrew F. K...
123
Voted
GECCO
2008
Springer
139views Optimization» more  GECCO 2008»
15 years 4 months ago
Evolutionary design of dynamic SwarmScapes
This paper discusses interactive evolutionary algorithms and their application in swarm-based image generation. From an artist’s perspective, the computer-generated patterns oď¬...
Namrata Khemka, Scott Novakowski, Gerald Hushlak, ...
CHI
2011
ACM
14 years 7 months ago
The effects of task dimensionality, endpoint deviation, throughput calculation, and experiment design on pointing measures and m
Fitts’ law (1954) characterizes pointing speed-accuracy performance as throughput, whose invariance to target distances (A) and sizes (W) is known. However, it is unknown whethe...
Jacob O. Wobbrock, Kristen Shinohara, Alex Jansen