Sciweavers

2648 search results - page 80 / 530
» Human Factors In Computer Security
Sort
View
CHI
2003
ACM
15 years 10 months ago
Marked for deletion: an analysis of email data
What characteristics of an email message make it more likely to be discarded? Statistical analyses of a set of deleted and non-deleted messages revealed several factors that were ...
Laura Dabbish, Gina Danielle Venolia, Jonathan J. ...
CHI
1998
ACM
15 years 2 months ago
Squeeze Me, Hold Me, Tilt Me! An Exploration of Manipulative User Interfaces
This paperreportson the designanduseof tactile userinterfacesembeddedwithin or wrappedaroundthe devices that they control. We discussthree different interaction prototypesthat we ...
Beverly L. Harrison, Kenneth P. Fishkin, Anuj Guja...
ICCV
2007
IEEE
15 years 11 months ago
Soylent Grid: it's Made of People
The ground truth labeling of an image dataset is a task that often requires a large amount of human time and labor. We present an infrastructure for distributed human labeling tha...
Stephan Steinbach, Vincent Rabaud, Serge Belongie
TCC
2005
Springer
118views Cryptology» more  TCC 2005»
15 years 3 months ago
On the Relationships Between Notions of Simulation-Based Security
Several compositional forms of simulation-based security have been proposed in the literature, including universal composability, black-box simulatability, and variants thereof. Th...
Anupam Datta, Ralf Küsters, John C. Mitchell,...
ACMDIS
2008
ACM
14 years 12 months ago
Flutter: directed random browsing of photo collections with a tangible interface
Large collections of photographs are commonplace, and many interfaces for viewing, sorting and organizing them have been proposed. This work describes the design and implementatio...
John Williamson, Lorna M. Brown