Sciweavers

2648 search results - page 44 / 530
» Human Factors In Computer Security
Sort
View
CSCW
2006
ACM
15 years 3 months ago
Email overload at work: an analysis of factors associated with email strain
Almost every office worker can relate to feelings of email overload and stress, but in reality the concept of email strain is not well understood. In this paper, we describe a lar...
Laura A. Dabbish, Robert E. Kraut
SCA
2007
15 years 5 days ago
Smooth movers: perceptually guided human motion simulation
To animate a character, a number of poses are displayed in quick succession in order to create the illusion of motion. For most real-time applications, such as games, the pose upd...
Rachel McDonnell, Fiona N. Newell, Carol O'Sulliva...
CHI
2008
ACM
15 years 10 months ago
Design of human-map system interaction
In this work-in-progress we present some ideas and findings involving map design and human performance. Satellites has once and for all automated geographic positioning and result...
Thomas Porathe, Johannes Prison
MOBISYS
2009
ACM
15 years 10 months ago
SPATE: small-group PKI-less authenticated trust establishment
Establishing trust between a group of individuals remains a difficult problem. Prior works assume trusted infrastructure, require an individual to trust unknown entities, or provi...
Yue-Hsun Lin, Ahren Studer, Hsu-Chun Hsiao, Jonath...
ITICSE
2009
ACM
15 years 4 months ago
Xen worlds: leveraging virtualization in distance education
The Xen Worlds project at Iowa State University was designed to provide a virtualized lab environment for the Information Assurance program. The large number of off-campus student...
Benjamin R. Anderson, Amy K. Joines, Thomas E. Dan...