-
1
-
-
33749570363
-
Automation and customization of rendered web
-
Bolin, M., Webber, M., Rha, P., Wilson, T., and Miller, R.C. Automation and customization of rendered web pages. In Proc. UIST '05, 163-172.
-
Proc. UIST '05
, pp. 163-172
-
-
Bolin, M.1
Webber, M.2
Rha, P.3
Wilson, T.4
Miller, R.C.5
-
2
-
-
0003429117
-
Are Passfaces more usable than passwords? A field trial investigation
-
Brostoff, S. and Sasse, M.A. Are Passfaces more usable than passwords? A field trial investigation. In Proc. HCI 2000, 405-424.
-
(2000)
Proc. HCI
, pp. 405-424
-
-
Brostoff, S.1
Sasse, M.A.2
-
3
-
-
77955004564
-
Extracting social networks and contact information from email and the web
-
Culotta, A., Bekkerman, R., and McCallum, A. Extracting social networks and contact information from email and the web. In Proc. CEAS 2004.
-
Proc. CEAS 2004
-
-
Culotta, A.1
Bekkerman, R.2
McCallum, A.3
-
4
-
-
84861290223
-
How to make secure email easier to use
-
Garfinkel, S.L., Margrave, D., Schiller, J.I., Nordlander, E., and Miller, R.C. How to make secure email easier to use. In Proc. CHI '05, 701-710.
-
Proc. CHI '05
, pp. 701-710
-
-
Garfinkel, S.L.1
Margrave, D.2
Schiller, J.I.3
Nordlander, E.4
Miller, R.C.5
-
5
-
-
77953753799
-
Johnny 2: A user test of key continuity management with S/MIME and Outlook Express
-
Garfinkel, S.L. and Miller, R.C. Johnny 2: a user test of key continuity management with S/MIME and Outlook Express. In Proc. SOUPS '05, 13-24.
-
Proc. SOUPS '05
, pp. 13-24
-
-
Garfinkel, S.L.1
Miller, R.C.2
-
6
-
-
33745812088
-
Secrecy, flagging, and paranoia: Adoption criteria in encrypted email
-
Gaw, S., Felten, E.W., and Fernandez-Kelly, P. Secrecy, flagging, and paranoia: adoption criteria in encrypted email. In Proc. CHI '06, 591-600.
-
Proc. CHI '06
, pp. 591-600
-
-
Gaw, S.1
Felten, E.W.2
Fernandez-Kelly, P.3
-
7
-
-
33749556469
-
Automatic image retargeting with fisheye-view warping
-
Liu, F. and Gleicher, M. Automatic image retargeting with fisheye-view warping. In Proc. UIST '05, 153-162.
-
Proc. UIST '05
, pp. 153-162
-
-
Liu, F.1
Gleicher, M.2
-
9
-
-
33748941502
-
Never a safe feature, 'reply to all' falls into the wrong hands
-
Oct. 25
-
Sandberg, J. Never a safe feature, 'reply to all' falls into the wrong hands. Wall Street Journal, Oct. 25, 2005.
-
(2005)
Wall Street Journal
-
-
Sandberg, J.1
-
10
-
-
15344350492
-
Automatic thumbnail cropping and its effectiveness
-
Suh, B., Ling, H., Bederson, B.B., and Jacobs, D.W. Automatic thumbnail cropping and its effectiveness. In Proc. UIST 2003, 95-104.
-
(2003)
Proc. UIST
, pp. 95-104
-
-
Suh, B.1
Ling, H.2
Bederson, B.B.3
Jacobs, D.W.4
-
12
-
-
10844271575
-
ContactMap: Organizing communication in a social desktop
-
December
-
Whittaker, S., Jones, Q., Nardi, B., Creech, M., Terveen, L., Isaacs, E., and Hainsworth, J. ContactMap: organizing communication in a social desktop. ACM Transactions on Human-Computer Interaction, 11(4), December 2004, 445-471,
-
(2004)
ACM Transactions on Human-Computer Interaction
, vol.11
, Issue.4
, pp. 445-471
-
-
Whittaker, S.1
Jones, Q.2
Nardi, B.3
Creech, M.4
Terveen, L.5
Isaacs, E.6
Hainsworth, J.7
-
13
-
-
85084161247
-
Why Johnny can't encrypt: A usability evaluation of PGP 5.0
-
Whitten, A. and Tygar, J.D. Why Johnny can't encrypt: a usability evaluation of PGP 5.0. In Proc. USENIX Security 1999, 169-184.
-
Proc. USENIX Security 1999
, pp. 169-184
-
-
Whitten, A.1
Tygar, J.D.2
|