Sciweavers

2648 search results - page 399 / 530
» Human Factors In Computer Security
Sort
View
ICMI
2005
Springer
107views Biometrics» more  ICMI 2005»
15 years 8 months ago
Exploring multimodality in the laboratory and the field
There are new challenges to us, as researchers, on how to design and evaluate new mobile applications because they give users access to powerful computing devices through small in...
Lynne Baillie, Raimund Schatz
ICMI
2005
Springer
201views Biometrics» more  ICMI 2005»
15 years 8 months ago
A joint particle filter for audio-visual speaker tracking
In this paper, we present a novel approach for tracking a lecturer during the course of his speech. We use features from multiple cameras and microphones, and process them in a jo...
Kai Nickel, Tobias Gehrig, Rainer Stiefelhagen, Jo...
HUC
2005
Springer
15 years 8 months ago
A Study of Bluetooth Propagation Using Accurate Indoor Location Mapping
The ubiquitous computing community has widely researched the use of 802.11 for the purpose of location inference. Meanwhile, Bluetooth is increasingly widely deployed due to its lo...
Anil Madhavapeddy, Alastair Tse
ASSETS
2004
ACM
15 years 8 months ago
Accessibility of Internet websites through time
Using Internet Archive’s Wayback Machine, a random sample of websites from 1997-2002 were retrospectively analyzed for effects that technology has on accessibility for persons w...
Stephanie Hackett, Bambang Parmanto, Xiaoming Zeng
CSCW
2004
ACM
15 years 8 months ago
Using social psychology to motivate contributions to online communities
Under-contribution is a problem for many online communities. Social psychology theories of social loafing and goal-setting can provide mid-level design principles to address this ...
Gerard Beenen, Kimberly S. Ling, Xiaoqing Wang, Kl...