Sciweavers

2648 search results - page 523 / 530
» Human Factors In Computer Security
Sort
View
DGO
2006
82views Education» more  DGO 2006»
14 years 11 months ago
Should e-government design for citizen participation?: stealth democracy and deliberation
Cyberoptimists have heralded an age of citizen engagement enabled by electronic technologies that allow widespread citizen input in government decision making. In contrast, influe...
Peter Muhlberger
ASSETS
2008
ACM
14 years 10 months ago
Slide rule: making mobile touch screens accessible to blind people using multi-touch interaction techniques
Recent advances in touch screen technology have increased the prevalence of touch screens and have prompted a wave of new touch screen-based devices. However, touch screens are st...
Shaun K. Kane, Jeffrey P. Bigham, Jacob O. Wobbroc...
GIS
2008
ACM
14 years 10 months ago
Combining 3-D geovisualization with force feedback driven user interaction
We describe a prototype software system for investigating novel human-computer interaction techniques for 3-D geospatial data. This system, M4-Geo (Multi-Modal Mesh Manipulation o...
Adam Faeth, Michael Oren, Chris Harding
MM
2010
ACM
265views Multimedia» more  MM 2010»
14 years 9 months ago
Affective image classification using features inspired by psychology and art theory
Images can affect people on an emotional level. Since the emotions that arise in the viewer of an image are highly subjective, they are rarely indexed. However there are situation...
Jana Machajdik, Allan Hanbury
SIGCOMM
2010
ACM
14 years 9 months ago
Unbiased sampling in directed social graph
Microblogging services, such as Twitter, are among the most important online social networks(OSNs). Different from OSNs such as Facebook, the topology of microblogging service is ...
Tianyi Wang, Yang Chen, Zengbin Zhang, Peng Sun, B...