Sciweavers

4190 search results - page 398 / 838
» Implementing commitment-based interactions
Sort
View
CHI
2009
ACM
16 years 5 months ago
Lightweight tagging expands information and activity management practices
Could people use tagging to manage day-to-day work in their personal computing environment? Could tagging be sufficiently generic and lightweight to support diverse ways of workin...
Gerard Oleksik, Max L. Wilson, Craig S. Tashman, E...
CHI
2008
ACM
16 years 5 months ago
Conversation pivots and double pivots
Many sites on the web offer collaborative databases that catalog items such as bands, events, products, or software modules. Conversation pivots allow readers to navigate from pag...
Daniel Xiaodan Zhou, Nathan Oostendorp, Michael He...
CHI
2008
ACM
16 years 5 months ago
Undercover: authentication usable in front of prying eyes
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi
CHI
2008
ACM
16 years 5 months ago
Multi-flick: an evaluation of flick-based scrolling techniques for pen interfaces
Multi-flick, which consists of repeated flick actions, has received media attention as an intuitive and natural document-scrolling technique for stylus based systems. In this pape...
Dzmitry Aliakseyeu, Pourang Irani, Andrés L...
CHI
2008
ACM
16 years 5 months ago
Ninja cursors: using multiple cursors to assist target acquisition on large screens
We propose the "ninja cursor" to improve the performance of target acquisition, particularly on large screens. This technique uses multiple distributed cursors to reduce...
Masatomo Kobayashi, Takeo Igarashi