Sciweavers

4190 search results - page 403 / 838
» Implementing commitment-based interactions
Sort
View
144
Voted
CHI
2010
ACM
15 years 11 months ago
The secure haptic keypad: a tactile password system
Authentication in public spaces poses significant security risks. Most significantly, passwords can be stolen, potentially leading to fraud. A common method to steal a PIN is thro...
Andrea Bianchi, Ian Oakley, Dong Soo Kwon
124
Voted
CHI
2010
ACM
15 years 11 months ago
Are your participants gaming the system?: screening mechanical turk workers
In this paper we discuss a screening process used in conjunction with a survey administered via Amazon.com’s Mechanical Turk. We sought an easily implementable method to disqual...
Julie S. Downs, Mandy B. Holbrook, Steve Sheng, Lo...
CHI
2010
ACM
15 years 11 months ago
What would other programmers do: suggesting solutions to error messages
Interpreting compiler errors and exception messages is challenging for novice programmers. Presenting examples of how other programmers have corrected similar errors may help novi...
Björn Hartmann, Daniel MacDougall, Joel Brand...
CHI
2010
ACM
15 years 11 months ago
Short and tweet: experiments on recommending content from information streams
More and more web users keep up with newest information through information streams such as the popular microblogging website Twitter. In this paper we studied content recommendat...
Jilin Chen, Rowan Nairn, Les Nelson, Michael Berns...
CHI
2010
ACM
15 years 11 months ago
Example-centric programming: integrating web search into the development environment
The ready availability of online source code examples has changed the cost structure of programming by example modification. However, current search tools are wholly separate from...
Joel Brandt, Mira Dontcheva, Marcos Weskamp, Scott...