Sciweavers

504 search results - page 48 / 101
» Names and reference in user interfaces
Sort
View
DIM
2008
ACM
15 years 5 months ago
Anti-phishing based on automated individual white-list
In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
Ye Cao, Weili Han, Yueran Le
116
Voted
UIST
2009
ACM
15 years 10 months ago
Disappearing mobile devices
In this paper, we extrapolate the evolution of mobile devices in one specific direction, namely miniaturization. While we maintain the concept of a device that people are aware of...
Tao Ni, Patrick Baudisch
ISTA
2004
15 years 5 months ago
A Conceptual Modeling Technique Based on Semantically Complete Model, Its Applications
: The article proposes a conceptual modeling technique based on Semantically Complete model, the main property of which is that relations carry complete information about interconn...
Vladimir Ovchinnikov
SEMWEB
2009
Springer
15 years 10 months ago
Functions over RDF Language Elements
Spreadsheet tools are often used in business and private scenarios in order to collect and store data, and to explore and analyze these data by executing functions and aggregation...
Bernhard Schandl
UIST
1995
ACM
15 years 7 months ago
3-Dimensional Pliable Surfaces: For the Effective Presentation of Visual Information
A fundamental issue in user interface design is the effective use of available screen space, commonly referred to as the screen real estate problem. This paper presents a new dist...
M. Sheelagh T. Carpendale, David J. Cowperthwaite,...