Sciweavers

1891 search results - page 235 / 379
» Interactive Analysis of Computer Crimes
Sort
View
120
Voted
CHI
2007
ACM
16 years 5 months ago
Location, location, location: a study of bluejacking practices
We present an initial exploration of bluejacking, the practice of using Bluetooth-enabled mobile phones to send unsolicited messages to other Bluetooth-enabled mobile phones withi...
Jennifer Thom-Santelli, Alex Ainslie, Geri Gay
CHI
2006
ACM
16 years 5 months ago
Using linguistic features to measure presence in computer-mediated communication
We propose a method of measuring people's sense of presence in computer-mediated communication (CMC) systems) based on linguistic features of their dialogues. We create varia...
Adam D. I. Kramer, Lui Min Oh, Susan R. Fussell
CHI
2005
ACM
16 years 5 months ago
Six themes of the communicative appropriation of photographic images
In this paper, we explore the use of digital photographs in computer-mediated communication. We present Lascaux, an instant messaging client that serves as a research platform for...
Amy Voida, Elizabeth D. Mynatt
CHI
2005
ACM
16 years 5 months ago
Imprints of place: creative expressions of the museum experience
Personalization and social awareness, important aspects in the definition of a place, are traditionally overlooked in the design of technology for museums. We describe Imprints, a...
Kirsten Boehner, Jennifer Thom-Santelli, Angela Zo...
CHI
2004
ACM
16 years 5 months ago
A commonsense approach to predictive text entry
People cannot type as fast as they think, especially when faced with the constraints of mobile devices. There have been numerous approaches to solving this problem, including rese...
Tom Stocky, Alexander Faaborg, Henry Lieberman