Sciweavers

2648 search results - page 373 / 530
» Human Factors In Computer Security
Sort
View
CHI
2010
ACM
15 years 10 months ago
A stage-based model of personal informatics systems
People strive to obtain self-knowledge. A class of systems called personal informatics is appearing that help people collect and reflect on personal information. However, there is...
Ian Li, Anind K. Dey, Jodi Forlizzi
CHI
2010
ACM
15 years 10 months ago
Signed networks in social media
Relations between users on social media sites often reflect a mixture of positive (friendly) and negative (antagonistic) interactions. In contrast to the bulk of research on soci...
Jure Leskovec, Daniel P. Huttenlocher, Jon M. Klei...
CHI
2010
ACM
15 years 10 months ago
Let's play chinese characters: mobile learning approaches via culturally inspired group games
In many developing countries such as India and China, low educational levels often hinder economic empowerment. In this paper, we argue that mobile learning games can play an impo...
Feng Tian, Fei Lv, Jingtao Wang, Hongan Wang, Wenc...
CHI
2010
ACM
15 years 10 months ago
Social gravity: a virtual elastic tether for casual, privacy-preserving pedestrian rendezvous
We describe a virtual “tether” for mobile devices that allows groups to have quick, simple and privacy-preserving meetups. Our design provides cues which allow dynamic coordin...
John Williamson, Simon Robinson, Craig Stewart, Ro...
115
Voted
MHCI
2009
Springer
15 years 9 months ago
Impact of item density on magic lens interactions
We conducted a user study to investigate the effect of visual context in handheld augmented reality interfaces. A dynamic peephole interface (without visual context beyond the dev...
Michael Rohs, Georg Essl, Johannes Schöning, ...