Sciweavers

1384 search results - page 148 / 277
» Protocol Models of Human-Computer Interaction
Sort
View
90
Voted
CRYPTO
2011
Springer
207views Cryptology» more  CRYPTO 2011»
13 years 10 months ago
Secure Computation on the Web: Computing without Simultaneous Interaction
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even i...
Shai Halevi, Yehuda Lindell, Benny Pinkas
80
Voted
CHI
2008
ACM
15 years 10 months ago
Activity sensing in the wild: a field trial of ubifit garden
Recent advances in small inexpensive sensors, low-power processing, and activity modeling have enabled applications that use on-body sensing and machine learning to infer people&#...
Sunny Consolvo, David W. McDonald, Tammy Toscos, M...
66
Voted
CHI
2008
ACM
15 years 10 months ago
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
Many popular web browsers now include active phishing warnings since research has shown that passive warnings are often ignored. In this laboratory study we examine the effectiven...
Serge Egelman, Lorrie Faith Cranor, Jason I. Hong
CHI
2008
ACM
15 years 10 months ago
Evaluation of a role-based approach for customizing a complex development environment
Coarse-grained approaches to customization allow the user to enable or disable groups of features at once, rather than individual features. While this may reduce the complexity of...
Leah Findlater, Joanna McGrenere, David Modjeska
61
Voted
CHI
2006
ACM
15 years 10 months ago
Player-centred game design
We describe an approach to player-centred game design through adaptive game technologies [9]. The work presented is the result of on-going collaborative research between Media and...
Jonathan Sykes, Melissa Federoff