Sciweavers

2648 search results - page 353 / 530
» Human Factors In Computer Security
Sort
View
120
Voted
CHI
2010
ACM
15 years 10 months ago
End-user mashup programming: through the design lens
Programming has recently become more common among ordinary end users of computer systems. We believe that these end-user programmers are not just coders but also designers, in tha...
Jill Cao, Yann Riche, Susan Wiedenbeck, Margaret M...
127
Voted
CHI
2010
ACM
15 years 10 months ago
Real time search user behavior
Real time search is an increasingly important area of information seeking on the Web. In this research, we analyze 1,005,296 user interactions with a real time search engine over ...
Bernard J. Jansen, Gerry Campbell, Matthew Gregg
122
Voted
CSE
2009
IEEE
15 years 10 months ago
A Study of Information Diffusion over a Realistic Social Network Model
—Sociological models of human behavior can explain population-level phenomena within social systems; computer modeling can simulate a wide variety of scenarios and allow one to p...
Andrea Apolloni, Karthik Channakeshava, Lisa Durbe...
MHCI
2005
Springer
15 years 8 months ago
Three applications for mobile epidemic algorithms
This paper presents a framework for the pervasive sharing of data using wireless networks. ‘FarCry’ uses the mobility of users to carry files between separated networks. Throu...
Paul Tennent, Malcolm Hall, Barry Brown, Matthew C...
155
Voted
ACMACE
2004
ACM
15 years 8 months ago
Audio games: new perspectives on game audio
This paper discusses the design of audio games, a quite new computer game category that originates from games for players with visual impairments, as well as mainstream music game...
Johnny Friberg, Dan Gärdenfors