Sciweavers

4190 search results - page 407 / 838
» Implementing commitment-based interactions
Sort
View
151
Voted
ISEUD
2009
Springer
15 years 11 months ago
Fast, Accurate Creation of Data Validation Formats by End-User Developers
Abstract. Inputs to web forms often contain typos or other errors. However, existing web form design tools require end-user developers to write regular expressions (“regexps”) ...
Christopher Scaffidi, Brad A. Myers, Mary Shaw
MHCI
2009
Springer
15 years 11 months ago
Examining human values in adopting ubiquitous technology in school
This paper summarizes value analysis of adopting technologysupported attendance control service in a primary school. The results are based on a case study that explored a 14-week ...
Minna Isomursu, Mari Ervasti, Marianne Kinnula, Pe...
MHCI
2009
Springer
15 years 11 months ago
Emotion sharing via self-composed melodies on mobile phones
In their role as personal communication devices, mobile phones are a natural choice for sharing and communicating emotions. However, their functionalities are currently very limit...
Alireza Sahami Shirazi, Florian Alt, Albrecht Schm...
MHCI
2009
Springer
15 years 11 months ago
A context-sensitive security model for privacy protection on mobile phones
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
SMA
2009
ACM
219views Solid Modeling» more  SMA 2009»
15 years 11 months ago
Log-aesthetic space curve segments
For designing aesthetic surfaces, such as the car bodies, it is very important to use aesthetic curves as characteristic lines. In such curves, the curvature should be monotonical...
Norimasa Yoshida, Ryo Fukuda, Takafumi Saito