Sciweavers

524 search results - page 89 / 105
» Why phishing works
Sort
View
CHI
2009
ACM
15 years 10 months ago
Focus on driving: how cognitive constraints shape the adaptation of strategy when dialing while driving
We investigate how people adapt their strategy for interleaving multiple concurrent tasks to varying objectives. A study was conducted in which participants drove a simulated vehi...
Duncan P. Brumby, Dario D. Salvucci, Andrew Howes
CHI
2005
ACM
15 years 10 months ago
Towards an index of opportunity: understanding changes in mental workload during task execution
To contribute to systems that reason about human attention, our work empirically demonstrates how a user's mental workload changes during task execution. We conducted a study...
Shamsi T. Iqbal, Piotr D. Adamczyk, Xianjun Sam Zh...
CHI
2004
ACM
15 years 10 months ago
Interactive Comprehensible Data Mining
This paper discusses a novel data mining system devised and developed at Birmingham, which attempts to provide a more effective data mining system. It ties in with the workshop go...
Andy Pryke, Russell Beale
CHI
2002
ACM
15 years 10 months ago
Effects of four computer-mediated communications channels on trust development
When virtual teams need to establish trust at a distance, it is advantageous for them to use rich media to communicate. We studied the emergence of trust in a social dilemma game ...
Nathan Bos, Judith S. Olson, Darren Gergle, Gary M...
SIGMOD
2004
ACM
204views Database» more  SIGMOD 2004»
15 years 9 months ago
Buffering Database Operations for Enhanced Instruction Cache Performance
As more and more query processing work can be done in main memory, memory access is becoming a significant cost component of database operations. Recent database research has show...
Jingren Zhou, Kenneth A. Ross