Sciweavers

2648 search results - page 402 / 530
» Human Factors In Computer Security
Sort
View
WISER
2004
ACM
15 years 3 months ago
Software, architecture, and participatory design
Much work in software architecture has been inspired by work in physical architecture, in particular Alexander’s work on ‘design patterns’. By contrast, Alexander’s work i...
Stephen Rank, Carl O'Coill, Cornelia Boldyreff, Ma...
GROUP
2003
ACM
15 years 3 months ago
Information seeking and sharing in design teams
Information retrieval is generally considered an individual activity, and information retrieval research and tools reflect this view. As digitally mediated communication and infor...
Steven E. Poltrock, Jonathan Grudin, Susan T. Duma...
GROUP
2003
ACM
15 years 3 months ago
Instant group communication with QuickML
A number of people are exchanging e-mail messages everyday using mobile phones and PDAs. E-mail is useful not only for oneto-one communication but group communication through mail...
Toshiyuki Masui, Satoru Takabayashi
IUI
2003
ACM
15 years 3 months ago
Adapting to the user's internet search strategy on small devices
World Wide Web search engines typically return thousands of results to the users. To avoid users browsing through the whole list of results, search engines use ranking algorithms ...
Jean-David Ruvini
MM
2003
ACM
168views Multimedia» more  MM 2003»
15 years 3 months ago
Interacting with audio streams for entertainment and communication
We present a new model of interactive audio for entertainment and communication. A new device called the DJammer and its associated technologies are described. The DJammer introdu...
Mat C. Hans, Mark T. Smith