Sciweavers

2648 search results - page 382 / 530
» Human Factors In Computer Security
Sort
View
CHI
2011
ACM
14 years 6 months ago
Twitinfo: aggregating and visualizing microblogs for event exploration
Microblogs are a tremendous repository of user-generated content about world events. However, for people trying to understand events by querying services like Twitter, a chronolog...
Adam Marcus 0002, Michael S. Bernstein, Osama Bada...
CHI
2011
ACM
14 years 6 months ago
No clicks, no problem: using cursor movements to understand and improve search
Understanding how people interact with search engines is important in improving search quality. Web search engines typically analyze queries and clicked results, but these actions...
Jeff Huang, Ryen W. White, Susan T. Dumais
CHI
2011
ACM
14 years 6 months ago
When designing usability questionnaires, does it hurt to be positive?
When designing questionnaires there is a tradition of including items with both positive and negative wording to minimize acquiescence and extreme response biases. Two disadvantag...
Jeff Sauro, James R. Lewis
CHI
2011
ACM
14 years 6 months ago
Starcraft from the stands: understanding the game spectator
Video games are primarily designed for the players. However, video game spectating is also a popular activity, boosted by the rise of online video sites and major gaming tournamen...
Gifford Cheung, Jeff Huang
HRI
2011
ACM
14 years 6 months ago
A robotic game to evaluate interfaces used to show and teach visual objects to a robot in real world condition
In this paper, we present a real world user study of 4 interfaces designed to teach new visual objects to a social robot. This study was designed as a robotic game in order to mai...
Pierre Rouanet, Fabien Danieau, Pierre-Yves Oudeye...