Sciweavers

2648 search results - page 57 / 530
» Human Factors In Computer Security
Sort
View
CHI
2011
ACM
14 years 1 months ago
Evaluating video visualizations of human behavior
Previously, we presented Viz-A-Vis, a VIsualiZation of Activity through computer VISion [17]. Viz-A-Vis visualizes behavior as aggregate motion over observation space. In this pap...
Mario Romero, Alice Vialard, John Peponis, John T....
HCI
2007
14 years 11 months ago
Determining High Level Quantitative Usability Requirements: A Case Study
nded abstracts on Human factors in computing systems, San Jose. Jokela, T. (2007). Money for Better Usability. A Case Study on The Development of User Interface for A Mobile Phone....
Niina Kantola, Timo Jokela
MOBISYS
2007
ACM
15 years 9 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi
ASSETS
2006
ACM
15 years 3 months ago
Accessibility now!: teaching accessible computing at the introductory level
As ASSETS attendees, we are clearly interested in promoting accessibility in computing. One way to do this is to teach courses on the topic. Most such courses are aimed at upper-l...
Brian J. Rosmaita
SIGCSE
2004
ACM
114views Education» more  SIGCSE 2004»
15 years 3 months ago
Student culture vs group work in computer science
Our industrial advisory boards tell us that our students are well prepared technically, but they lack important group work skills. Simply adding project courses and requiring that...
William M. Waite, Michele H. Jackson, Amer Diwan, ...