Sciweavers

274 search results - page 33 / 55
» Security user studies: methodologies and best practices
Sort
View
FECS
2008
129views Education» more  FECS 2008»
14 years 11 months ago
Assessment of Student Performance in an Internet-Based Multimedia Classroom
Much research has been devoted to the study of exclusively distance-learning paradigms for teaching various technological subjects, yet many students have not been satisfied with ...
Stephen Turner, Michael Farmer
CHI
2010
ACM
15 years 4 months ago
Friends only: examining a privacy-enhancing behavior in facebook
Privacy practices in social network sites often appear paradoxical, as content-sharing behavior stands in conflict with the need to reduce disclosure-related harms. In this study ...
Fred Stutzman, Jacob Kramer-Duffield
CHI
2009
ACM
15 years 10 months ago
Storytelling through drawings: evaluating tangible interfaces for children
This paper presents an ongoing study comparing the potential and the quality of the experiences provided by tangible versus traditional interfaces. The study was carried with two ...
Cristina Sylla, Pedro Branco, Clara Coutinho, Mari...
SIGGRAPH
2010
ACM
15 years 2 months ago
Video tapestries with continuous temporal zoom
We present a novel approach for summarizing video in the form of a multiscale image that is continuous in both the spatial domain and across the scale dimension: There are no hard...
Connelly Barnes, Dan B. Goldman, Eli Shechtman, Ad...
ISMAR
2003
IEEE
15 years 3 months ago
Evaluating Label Placement for Augmented Reality View Management
View management, a relatively new area of research in Augmented Reality (AR) applications, is about the spatial layout of 2D virtual annotations in the view plane. This paper repr...
Ronald Azuma, Chris Furmanski