Sciweavers

2749 search results - page 182 / 550
» Usability of interaction patterns
Sort
View
105
Voted
CHI
2008
ACM
16 years 4 months ago
Biometric daemons: authentication via electronic pets
A well-known security and identification problem involves the creation of secure but usable identification and authentication tools that the user is fully motivated to adopt. We d...
Pamela Briggs, Patrick L. Olivier
CHI
2006
ACM
16 years 4 months ago
Co-authoring with structured annotations
Most co-authoring tools support basic annotations, such as edits and comments that are anchored at specific locations in the document. However, they do not support metacommentary ...
Qixing Zheng, Kellogg S. Booth, Joanna McGrenere
CHI
2004
ACM
16 years 4 months ago
Using heuristics to evaluate the playability of games
Heuristics have become an accepted and widely used adjunct method of usability evaluation in Internet and software development. This report introduces Heuristic Evaluation for Pla...
Heather Desurvire, Martin Caplan, Jozsef A. Toth
CHI
2004
ACM
16 years 4 months ago
Photo annotation on a camera phone
In this paper we describe a system that allows users to annotate digital photos at the time of capture. The system uses camera phones with a lightweight client application and a s...
Anita Wilhelm, Yuri Takhteyev, Risto Sarvas, Nancy...
CHI
2010
ACM
15 years 11 months ago
Input precision for gaze-based graphical passwords
Click-based graphical passwords have been proposed as alternatives to text-based passwords, despite being potentially vulnerable to shoulder-surfing, where an attacker can learn p...
Alain Forget, Sonia Chiasson, Robert Biddle