Sciweavers

744 search results - page 106 / 149
» The Traust Authorization Service
Sort
View
CHI
2008
ACM
15 years 10 months ago
Friends and foes: ideological social networking
Traditional online social network sites use a single monolithic "friends" relationship to link users. However, users may have more in common with strangers, suggesting t...
Gábor Szabó, Michael J. Brzozowski, ...
CHI
2008
ACM
15 years 10 months ago
Paperproof: a paper-digital proof-editing system
Recent approaches for linking paper and digital information or services tend to be based on a one-time publishing of digital information where changes to the printed document beco...
Nadir Weibel, Adriana Ispas, Beat Signer, Moira C....
CHI
2007
ACM
15 years 10 months ago
Keystroke-level model for advanced mobile phone interaction
The design of applications using mobile devices needs a different quality assessment than those known for desktop applications. Of the many aspects that have to be taken into acco...
Paul Holleis, Friederike Otto, Heinrich Hussmann, ...
CHI
2007
ACM
15 years 10 months ago
Pictures at the ATM: exploring the usability of multiple graphical passwords
Users gain access to cash, confidential information and services at Automated Teller Machines (ATMs) via an authentication process involving a Personal Identification Number (PIN)...
Wendy Moncur, Grégory Leplâtre
CHI
2006
ACM
15 years 10 months ago
Watching the cars go round and round: designing for active spectating
Spectating at sport events is a common and popular leisure activity worldwide. Recently spectating has also become a topic of interest to CHI, particularly the design of technolog...
Barry A. T. Brown, Daniel Normark, Eric Laurier, M...