HCI Bibliography : Human-Computer Interaction Resourceshttp://hcibib.org/
HCI Bibliography : Human-Computer Interaction Resources Page updated: 2018-10-16 Accesses since 1998-04-10 : director@hcibib.org Hosted by ACM SIGCHI The HCI Bibliogaphy was moved
The HCI Bibliography (HCIBIB) is a free-access bibliography on Human-Computer Interaction, with over 100,000 records in a searchable database. HCIBIB.ORG is also one of the premie
Orbit Interactionhttps://orbitnet.com/
Home Office and Kitchen Computers http://www.orbitnet.com/Apple Apple / Disney Epcot Project Portfolio - Page 1 Apple / Disney Epcot Project Portfolio - Page 2 Apple / Disney Epco
The Anatomy of a Search Enginehttp://infolab.stanford.edu/~backrub/google.html
As the capabilities of computers increase, it becomes possible to index a very large amount of text for a reasonable cost. Of course, other more bandwidth intensive media such as
What's New! December 1993http://home.mcom.com/home/whatsnew/whats_new_1293.html
Int'l Conference on Human-Computer Interaction . A Web server is up at Calvin College . A Web server is online at University of Hartford . A new Web server is up at SUNY Institute
Petroglyphs: Art or Writing?http://www.johnpratt.com/items/docs/lds/meridian/2006/petroglyphs.html
Formerly, our modern computers mostly used alphbetic instructions. Today we see a rather standardized set of icons that have replaced many of those words. Which do you prefer, Win
Native American tradition combined with scientific decoding methods indicate that rock art is really a sophisticated form of writing.
In Memoriam Kristen Nygaardhttp://kristennygaard.no/in_memoriam_kristen/
School" of Human-Computer Interaction.) and I was impressed by his visions, humor, rigidity, political engagement and friendliness. We have lost a pioneer and visionary of informa
Obituaries for Kristen Nygaard
Amicus Briefhttps://archive.epic.org/crypto/export_controls/bernstein_brief.html
studies and on the NRC Computers at Risk study.He has long been involved in research in security, reliability,safety, and system risks. He is Principal Scientist in the ComputerSc
SIGPLAN Research Highlights Papershttps://www.sigplan.org/Highlights/Papers/
sending it to the cloud computers, in order to ensure secrets are not leaked. But how can a cloud computer compute on encrypted data? The SMC (secure multi-party computation) comm
flipCode - Game Development News & Resourceshttps://www.flipcode.com/misc/siggraph2002.shtml
a hockey arena with computers... both have traveled far from their humbler beginnings. Spotlight on America’s Army Michael Zyda, Director of the Naval MOVES Institute , whic
Web Surfinghttp://web.cs.wpi.edu/~jshutt/surfing.html
Interacting with Computers , 2016) (26-Apr-19; 07-Jan-21) The Craft of Text Editing --or-- Emacs for the Modern World (Craig A. Finseth, 1999) (24-Jul-19; 11-Jan-21) Evil Mode: Or
How to run a small social network site for your friendshttps://runyourown.social/
media sites all run on computers, usually a big complex network of computers. When you type "facebook.com" into your browser or load up your Facebook app, what happens i
This document exists to lay out some general principles of running a small social network site that have worked for me. These principles are related to community building more than
Peter Gutmann's Home Pagehttps://www.cs.auckland.ac.nz/~pgut001/
mechanisms (and computers in general), and outlines means of protecting crypto in environments where you need to expect data and computation results to modify themselves at random
Find more...