Sciweavers

547 search results - page 78 / 110
» chi 2010
Sort
View
CHI
2010
ACM
14 years 10 months ago
A comparative evaluation on tree visualization methods for hierarchical structures with large fan-outs
Hierarchical structures with large fan-outs are hard to browse and understand. In the conventional node-link tree visualization, the screen quickly becomes overcrowded as users op...
Hyunjoo Song, Bo Hyoung Kim, Bongshin Lee, Jinwook...
CHI
2010
ACM
14 years 9 months ago
Expressive robots in education: varying the degree of social supportive behavior of a robotic tutor
Teaching is inherently a social interaction between teacher and student. Despite this knowledge, many educational tools, such as vocabulary training programs, still model the inte...
Martin Saerbeck, Tom Schut, Christoph Bartneck, Ma...
104
Voted
CHI
2010
ACM
14 years 7 months ago
Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions
In this paper we present the results of a roleplay survey instrument administered to 1001 online survey respondents to study both the relationship between demographics and phishin...
Steve Sheng, Mandy B. Holbrook, Ponnurangam Kumara...
101
Voted
ICWSM
2010
15 years 1 months ago
A Comparison of Generated Wikipedia Profiles Using Social Labeling and Automatic Keyword Extraction
In many collaborative systems, researchers are interested in creating representative user profiles. In this paper, we are particularly interested in using social labeling and auto...
Terrell Russell, Bongwon Suh, Ed H. Chi
DSS
2006
91views more  DSS 2006»
15 years 14 days ago
Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach
Organizations are making substantial investments in information security to reduce the risk presented by vulnerabilities in their information technology (IT) infrastructure. Howev...
Mukul Gupta, Jackie Rees, Alok R. Chaturvedi, Jie ...