Sciweavers

12478 search results - page 296 / 2496
» Secure Interaction Design
Sort
View
CHI
2007
ACM
16 years 5 months ago
Noticing notice: a large-scale experiment on the timing of software license agreements
Spyware is an increasing problem. Interestingly, many programs carrying spyware honestly disclose the activities of the software, but users install the software anyway. We report ...
Nathaniel Good, Jens Grossklags, Deirdre K. Mullig...
GECCO
2007
Springer
163views Optimization» more  GECCO 2007»
15 years 11 months ago
Interactive evolution of XUL user interfaces
We attack the problem of user fatigue by using an interactive genetic algorithm to evolve user interfaces in the XUL interface definition language. The interactive genetic algori...
Juan C. Quiroz, Sushil J. Louis, Sergiu M. Dascalu
CDVE
2008
Springer
191views Visualization» more  CDVE 2008»
15 years 6 months ago
Applying Web 2.0 Design Principles in the Design of Cooperative Applications
Abstract. "Web 2.0" is a term frequently mentioned in media - apparently, applications such as Wikipedia, Social Network Services, Online Shops with integrated recommende...
Niels Pinkwart
CHI
1996
ACM
15 years 9 months ago
NewsComm: A Hand-Held Interface for Interactive Access to Structured Audio
The NewsComm system delivers personalized news and other program material as audio to mobile users through a hand-held playback device. This paper focuses on the iterative design ...
Deb K. Roy, Chris Schmandt
ACSAC
2003
IEEE
15 years 10 months ago
Poly2 Paradigm: A Secure Network Service Architecture
General-purpose operating systems provide a rich computing environment both to the user and the attacker. The declining cost of hardware and the growing security concerns of softw...
Eric Bryant, James P. Early, Rajeev Gopalakrishna,...