Sciweavers

547 search results - page 66 / 110
» chi 2010
Sort
View
85
Voted
CHI
2010
ACM
15 years 7 months ago
ColorPIN: securing PIN entry through indirect input
Automated teller machine (ATM) frauds are increasing drastically these days. When analyzing the most common attacks and the reasons for successful frauds, it becomes apparent that...
Alexander De Luca, Katja Hertzschuch, Heinrich Hus...
61
Voted
CHI
2010
ACM
15 years 7 months ago
Deception and magic in collaborative interaction
We explore the ways in which interfaces can be designed to deceive users so as to create the illusion of magic. We present a study of an experimental performance in which a magici...
Joe Marshall, Steve Benford, Tony P. Pridmore
97
Voted
CHI
2010
ACM
15 years 7 months ago
Detecting professional versus personal closeness using an enterprise social network site
In this work we analyze the behavior on a company-internal social network site to determine which interaction patterns signal closeness between colleagues. Regression analysis sug...
Anna Wu, Joan Morris DiMicco, David R. Millen
91
Voted
CHI
2010
ACM
15 years 7 months ago
Cord input: an intuitive, high-accuracy, multi-degree-of-freedom input method for mobile devices
A cord, although simple in form, has many interesting physical affordances that make it powerful as an input device. Not only can a length of cord be grasped in different location...
Julia Schwarz, Chris Harrison, Scott E. Hudson, Je...
CHI
2010
ACM
15 years 7 months ago
Postcolonial computing: a lens on design and development
As our technologies travel to new cultural contexts and our designs and methods engage new constituencies, both our design and analytical practices face significant challenges. We...
Lilly Irani, Janet Vertesi, Paul Dourish, Kavita P...