Sciweavers

1573 search results - page 196 / 315
» Strong User Authentication
Sort
View
98
Voted
CHI
2004
ACM
16 years 2 months ago
Mouse ether: accelerating the acquisition of targets across multi-monitor displays
When acquiring a target located on a different screen, multi-monitor users face a challenge: differences in resolution and vertical and horizontal offsets between screens cause th...
Patrick Baudisch, Edward Cutrell, Ken Hinckley, Ro...
93
Voted
CHI
2010
ACM
15 years 8 months ago
Multitasking and monotasking: the effects of mental workload on deferred task interruptions
Recent research has found that forced interruptions at points of higher mental workload are more disruptive than at points of lower workload. This paper investigates a complementa...
Dario D. Salvucci, Peter Bogunovich
COMPSAC
2008
IEEE
15 years 8 months ago
Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider
—Internet users interact with multiple Web Service Providers (WSP), and therefore, must remember and manage multiple passwords. Users try to overcome the burden of password manag...
Golnaz Elahi, Zeev Lieber, Eric S. K. Yu
92
Voted
NORDICHI
2006
ACM
15 years 7 months ago
Designing familiar open surfaces
While participatory design makes end-users part of the design process, we might also want the resulting system to be open for interpretation, appropriation and change over time to...
Kristina Höök
111
Voted
ICDAR
2003
IEEE
15 years 7 months ago
Correcting the Document Layout: A Machine Learning Approach
In this paper, a machine learning approach to support the user during the correction of the layout analysis is proposed. Layout analysis is the process of extracting a hierarchica...
Donato Malerba, Floriana Esposito, Oronzo Altamura...