Sciweavers

13224 search results - page 138 / 2645
» Self-monitoring for Computer Users
Sort
View
ASSETS
2005
ACM
15 years 3 months ago
Toward Goldilocks' pointing device: determining a "just right" gain setting for users with physical impairments
We designed and evaluated an agent that recommends a pointing device gain for a given user, with mixed success. 12 participants with physical impairments used the Input Device Age...
Heidi Horstmann Koester, Edmund F. LoPresti, Richa...
89
Voted
GI
2007
Springer
15 years 8 months ago
Supporting Cross-Application Contexts with Dynamic User Interface Fusion
: Currently, user interfaces are defined by single applications but workflows may span multiple ones. In the result, users have to work with separated programs in parallel and de...
Pascal Bihler, Holger Mügge
CHI
2006
ACM
16 years 2 months ago
Making memories: applying user input logs to interface design and evaluation
In this paper, we describe our approach to designing interface components that automate the logging of user input. These recorded logs of user-system interactions can serve as a b...
Tamara Babaian, Wendy T. Lucas, Heikki Topi
CRITICAL
2005
15 years 3 months ago
A first analysis of the UsersAward programme from a value sensitive design perspective
The goal of the UsersAward programme is to develop and maintain a strategy for better workplace software through user-driven quality assessment. One of its key activities is the u...
Åke Walldius, Yngve Sundblad, Alan Borning
COMPUTER
2008
86views more  COMPUTER 2008»
15 years 2 months ago
SSL/TLS Session-Aware User Authentication
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications, such as Internet banking. SSL/TLS session-aware user authentication can be used to ...
Rolf Oppliger, Ralf Hauser, David A. Basin