Sciweavers

2648 search results - page 392 / 530
» Human Factors In Computer Security
Sort
View
HPDC
2007
IEEE
15 years 9 months ago
Precise and realistic utility functions for user-centric performance analysis of schedulers
Utility functions can be used to represent the value users attach to job completion as a function of turnaround time. Most previous scheduling research used simple synthetic repre...
Cynthia Bailey Lee, Allan Snavely
HUC
2007
Springer
15 years 9 months ago
Rapidly Exploring Application Design Through Speed Dating
Abstract. While the user-centered design methods we bring from humancomputer interaction to ubicomp help sketch ideas and refine prototypes, few tools or techniques help explore di...
Scott Davidoff, Min Kyung Lee, Anind K. Dey, John ...
128
Voted
PERVASIVE
2007
Springer
15 years 9 months ago
Explorations and Experiences with Ambient Information Systems
We have developed a series of ambient information systems and used each in our research lab for extended periods of time. The systems use technologies such as RFID, RSS, and Phidg...
John T. Stasko, Myungcheol Doo, Brian Dorn, Christ...
PERVASIVE
2007
Springer
15 years 9 months ago
Ambient Information Systems: Evaluation in Two Paradigms
We take two paradigms for information systems development, functionalism and social relativism, and apply their assumptions to the evaluation of ambient information systems. Ambie...
Zachary Pousman, John T. Stasko
ACMSE
2006
ACM
15 years 9 months ago
Embodied data objects: tangible interfaces to information appliances
This paper describes the idea of embodied data objects. Using this concept, everyday objects can be used to represent bits and bytes of active information. These data objects can ...
Manas Tungare, Pardha S. Pyla, Pradyut Bafna, Vlad...