Sciweavers

2648 search results - page 502 / 530
» Human Factors In Computer Security
Sort
View
UIST
2010
ACM
14 years 7 months ago
Enhanced area cursors: reducing fine pointing demands for people with motor impairments
Computer users with motor impairments face major challenges with conventional mouse pointing. These challenges are mostly due to fine pointing corrections at the final stages of t...
Leah Findlater, Alex Jansen, Kristen Shinohara, Mo...
ICNS
2009
IEEE
14 years 7 months ago
A BitTorrent Performance Evaluation Framework
In the last decade, file sharing systems have generally been dominated by P2P solutions. Whereas e-mail and HTTP have been the killer apps of the earlier Internet, a large percent...
Razvan Deaconescu, Razvan Rughinis, Nicolae Tapus
IHI
2010
133views Healthcare» more  IHI 2010»
14 years 4 months ago
Heuristic evaluation of persuasive health technologies
Persuasive technologies for promoting physical fitness, good nutrition, and other healthy behaviors have been growing in popularity. Despite their appeal, the evaluation of these ...
Julie A. Kientz, Eun Kyoung Choe, Brennen Birch, R...
MOBISYS
2011
ACM
14 years 18 days ago
AccuLoc: practical localization of performance measurements in 3G networks
Operators of 3G data networks need to distinguish the performance of each geographic area in their 3G networks to detect and resolve local network problems. This is because the qu...
Qiang Xu, Alexandre Gerber, Zhuoqing Morley Mao, J...
DGO
2011
285views Education» more  DGO 2011»
13 years 9 months ago
Social media use by government: from the routine to the critical
Social media (i.e., Twitter, Facebook, Flickr, YouTube) and other services with user-generated content have made a staggering amount of information (and misinformation) available....
Andrea L. Kavanaugh, Edward A. Fox, Steven D. Shee...