Sciweavers

2648 search results - page 460 / 530
» Human Factors In Computer Security
Sort
View
UIST
2010
ACM
14 years 7 months ago
Gesture search: a tool for fast mobile data access
Modern mobile phones can store a large amount of data, such as contacts, applications and music. However, it is difficult to access specific data items via existing mobile user in...
Yang Li
W4A
2010
ACM
14 years 7 months ago
Web not for all: a large scale study of web accessibility
The Web accessibility discipline strives for the study and improvement of front-end Web design towards people with disabilities. Best practices such as WCAG dictate how Web pages ...
Rui Lopes, Daniel Gomes, Luís Carriç...
ASSETS
2009
ACM
14 years 7 months ago
VocaliD: personalizing text-to-speech synthesis for individuals with severe speech impairment
Speech synthesis options on assistive communication devices are very limited and do not reflect the user’s vocal quality or personality. Previous work suggests that speakers wit...
Camil Jreige, Rupal Patel, H. Timothy Bunnell
CSCW
2011
ACM
14 years 4 months ago
Peer interaction effectively, yet infrequently, enables programmers to discover new tools
Computer users rely on software tools to work effectively and efficiently, but it is difficult for users to be aware of all the tools that might be useful to them. While there a...
Emerson R. Murphy-Hill, Gail C. Murphy
CSCW
2011
ACM
14 years 4 months ago
Creating a context of trust with ICTs: restoring a sense of normalcy in the environment
This paper reports on an ethnographic study of the technology-enabled behavior that took place amongst a citizen population living in a conflict zone. We interviewed 65 Iraqi citi...
Bryan Semaan, Gloria Mark