Sciweavers

694 search results - page 95 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
MHCI
2009
Springer
15 years 6 months ago
Automatic mobile menu customization based on user operation history
Mobile devices are becoming more and more difficult to use due to the sheer number of functions now supported. In this paper, we propose a menu customization system that ranks fun...
Yusuke Fukazawa, Mirai Hara, Masashi Onogi, Hideto...
MIXER
2004
15 years 1 months ago
Towards a Development Methodology for Augmented Reality User Interfaces
In this paper we describe why we believe that the development of Augmented Reality user interfaces requires special attention and cannot be efficiently handled with neither existi...
Christian Kulas, Christian Sandor, Gudrun Klinker
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
15 years 3 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
CHI
2005
ACM
16 years 6 days ago
Automating the detection of breaks in continuous user experience with computer games
This paper describes an approach towards automating the identification of design problems with three-dimensional mediated or gaming environments through the capture and query of u...
Tim Marsh, Kiyoung Yang, Cyrus Shahabi, Wee Ling W...
CHI
2002
ACM
16 years 5 days ago
Automating CPM-GOMS
CPM-GOMS is a modeling method that combines the task decomposition of a GOMS analysis with a model of human resource usage at the level of cognitive, perceptual, and motor operati...
Bonnie E. John, Alonso H. Vera, Michael Matessa, M...