Sciweavers

2399 search results - page 190 / 480
» On Authentication between Human and Computer
Sort
View
CHIMIT
2008
ACM
15 years 6 months ago
Guidelines for designing IT security management tools
An important factor that impacts the effectiveness of security systems within an organization is the usability of security management tools. In this paper, we present a survey of ...
Pooya Jaferian, David Botta, Fahimeh Raja, Kirstie...
CHI
2009
ACM
16 years 5 months ago
Familial collaborations in a museum
Studies of interactive systems in museums have raised important design considerations, but so far have failed to address sufficiently the particularities of family interaction and...
Tom Hope, Yoshiyuki Nakamura, Toru Takahashi, Atsu...
CHI
2009
ACM
16 years 5 months ago
Toward a unified theory of the multitasking continuum: from concurrent performance to task switching, interruption, and resumpti
Multitasking in user behavior can be represented along a continuum in terms of the time spent on one task before switching to another. In this paper, we present a theory of behavi...
Dario D. Salvucci, Niels Taatgen, Jelmer P. Borst
CHI
2009
ACM
16 years 5 months ago
Storytelling through drawings: evaluating tangible interfaces for children
This paper presents an ongoing study comparing the potential and the quality of the experiences provided by tangible versus traditional interfaces. The study was carried with two ...
Cristina Sylla, Pedro Branco, Clara Coutinho, Mari...
CHI
2009
ACM
16 years 5 months ago
Heat, fire and temperature: the industrial revolution and HCI
HCI has many challenges and internal debates (for example, where is our theory? What is the role of design in HCI? What is the relationship between research and practice? How do w...
David J. Gilmore