Sciweavers

5722 search results - page 278 / 1145
» Security Function Interactions
Sort
View
CHI
2006
ACM
16 years 3 months ago
Why phishing works
To build systems shielding users from fraudulent (or phishing) websites, designers need to know which attack strategies work and why. This paper provides the first empirical evide...
Rachna Dhamija, J. D. Tygar, Marti A. Hearst
PERCOM
2004
ACM
16 years 2 months ago
Proselytizing Pervasive Computing Education: A Strategy and Approach Influenced by Human-Computer Interaction
A course on pervasive computing should be structured around key functions throughout a systems development process to cover common underlying concerns throughout science and engin...
D. Scott McCrickard, Christa M. Chewar
NAACL
2004
15 years 4 months ago
The Tao of CHI: Towards Effective Human-Computer Interaction
End-to-end evaluations of conversational dialogue systems with naive users are currently uncovering severe usability problems that result in low task completion rates. Preliminary...
Robert Porzel, Manja Baudis
DARE
2000
163views more  DARE 2000»
15 years 4 months ago
"Interactive rooms - augmented reality in an architectural perspective"
ABSTRACTABSTRACTABSTRACTABSTRACT This paper will discus aspects of applying augmented reality technologies in architecture through experiments conducted in full-scale, and seen thr...
Peter Gall Krogh
123
Voted
ENVSOFT
2006
60views more  ENVSOFT 2006»
15 years 3 months ago
Interactive Ground Water (IGW)
IGW is a software environment for real-time 2D and 3D groundwater modeling. The software functions as a ``numerical laboratory'' in which the modeler can freely explore:...
Shu-Guang Li, Qun Liu