Sciweavers

14720 search results - page 2926 / 2944
» Interface
Sort
View
CHI
2011
ACM
14 years 3 months ago
Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes
While a large body of research on image-based authentication has focused on memorability, comparatively less attention has been paid to the new security challenges these schemes m...
Eiji Hayashi, Jason Hong, Nicolas Christin
CHI
2011
ACM
14 years 3 months ago
When the implication is not to design (technology)
As HCI is applied in increasingly diverse contexts, it is important to consider situations in which computational or information technologies may be less appropriate. This paper p...
Eric P. S. Baumer, M. Six Silberman
CHI
2011
ACM
14 years 3 months ago
Starcraft from the stands: understanding the game spectator
Video games are primarily designed for the players. However, video game spectating is also a popular activity, boosted by the rise of online video sites and major gaming tournamen...
Gifford Cheung, Jeff Huang
CHI
2011
ACM
14 years 3 months ago
Modeling users of intelligent systems
While many devices today increasingly have the ability to predict human activities, it is still difficult to build accurate personalized machine learning models. As users today wi...
Stephanie Rosenthal
CIDR
2011
401views Algorithms» more  CIDR 2011»
14 years 3 months ago
DBease: Making Databases User-Friendly and Easily Accessible
Structured query language (SQL) is a classical way to access relational databases. Although SQL is powerful to query relational databases, it is rather hard for inexperienced user...
Guoliang Li, Ju Fan, Hao Wu, Jiannan Wang, Jianhua...
« Prev « First page 2926 / 2944 Last » Next »