Sciweavers

744 search results - page 94 / 149
» The Traust Authorization Service
Sort
View
CHI
2008
ACM
15 years 10 months ago
Love and authentication
Passwords are ubiquitous, and users and service providers alike rely on them for their security. However, good passwords may sometimes be hard to remember. For years, security pra...
Markus Jakobsson, Erik Stolterman, Susanne Wetzel,...
CHI
2008
ACM
15 years 10 months ago
Breaking the disposable technology paradigm: opportunities for sustainable interaction design for mobile phones
We present a qualitative study of mobile phone ownership, replacement and disposal practices geared towards identifying design opportunities towards sustainable mobile phone inter...
Elaine M. Huang, Khai N. Truong
CHI
2007
ACM
15 years 10 months ago
What are you looking for?: an eye-tracking study of information usage in web search
Web search services are among the most heavily used applications on the World Wide Web. Perhaps because search is used in such a huge variety of tasks and contexts, the user inter...
Edward Cutrell, Zhiwei Guan
CHI
2006
ACM
15 years 10 months ago
Everyday practices with mobile video telephony
The mobile phone allowed people to communicate when and where they wanted, dramatically changing how audio telephony was integrated into daily life. With video telephony services ...
Kenton O'Hara, Alison Black, Matthew Lipson
CHI
2005
ACM
15 years 10 months ago
A framework for building reality-based interfaces for wireless-grid applications
The pervasive adoption of wireless technologies is creating a growing demand for seamless interaction with wireless services. By sharing resources across devices such as PDA'...
Orit Shaer