Sciweavers

575 search results - page 107 / 115
» Social data analysis workshop
Sort
View
CHIMIT
2007
ACM
15 years 1 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
ACMDIS
2008
ACM
14 years 11 months ago
Zebra: exploring users' engagement in fieldwork
Participatory Design is a design approach that provides a popular set of techniques for designing interactive systems in collaboration with end-users. Technology probes are one of...
Yann Riche, Matthew Simpson, Stephen Viller
ACMIDC
2010
14 years 11 months ago
How do you play with a robotic toy animal?: a long-term study of Pleo
Pleo is one of the more advanced interactive toys currently available for the home market, taking the form of a robotic dinosaur. We present an exploratory study of how it was int...
Ylva Fernaeus, Maria Håkansson, Mattias Jaco...
DGO
2008
188views Education» more  DGO 2008»
14 years 11 months ago
Enabling synergy between psychology and natural language processing for e-Government: crime reporting and investigative intervie
We are developing an automated crime reporting and investigative interview system. The system incorporates cognitive interview techniques to maximize witness memory recall, and in...
Alicia Iriberri, Chih Hao Ku, Gondy Leroy
AVI
2010
14 years 10 months ago
An architecture and a visual interface for tagging the 3D web
Content classification performed by end users is spreading through the web. Most of the work done so far is related to the hypermedia web. In spite of that, there is a growing mas...
Fabio Pittarello