Sciweavers

2648 search results - page 380 / 530
» Human Factors In Computer Security
Sort
View
HUC
2010
Springer
15 years 1 months ago
A holistic multipurpose life-log framework
Life-log systems have a wide range of usages from memory augmentation to health monitoring. Recent advances in pervasive devices and sensor networks enable us to create tools that...
Reza Rawassizadeh
185
Voted
ICCV
2009
IEEE
15 years 28 days ago
Selection and context for action recognition
Recognizing human action in non-instrumented video is a challenging task not only because of the variability produced by general scene factors like illumination, background, occlu...
Dong Han, Liefeng Bo, Cristian Sminchisescu
ACMIDC
2011
14 years 6 months ago
Pop goes the cell phone: asynchronous messaging for preschoolers
This paper outlines a series of experiments to develop asynchronous messaging systems for preschool aged children. Three unique systems build on a foundational design called Toast...
Hayes Raffle, Rafael Ballagas, Glenda Revelle, Koi...
CHI
2011
ACM
14 years 6 months ago
Enhancing credibility judgment of web search results
In this paper, we propose a system for helping users to judge the credibility of Web search results and to search for credible Web pages. Conventional Web search engines present o...
Yusuke Yamamoto, Katsumi Tanaka
113
Voted
CHI
2011
ACM
14 years 6 months ago
Surfpad: riding towards targets on a squeeze film effect
We present Surfpad, a pointing facilitation technique that does not decrease target distance or increase target width in either control or display space. This new technique operat...
Géry Casiez, Nicolas Roussel, Romuald Vanbe...