HCI Bibliography : Human-Computer Interaction Resourceshttp://hcibib.org/
HCI Bibliography : Human-Computer Interaction Resources Page updated: 2018-10-16 Accesses since 1998-04-10 : director@hcibib.org Hosted by ACM SIGCHI The HCI Bibliogaphy was moved
The HCI Bibliography (HCIBIB) is a free-access bibliography on Human-Computer Interaction, with over 100,000 records in a searchable database. HCIBIB.ORG is also one of the premie
Cryptography Amicus Brief 10/96https://archive.epic.org/crypto/export_controls/amicus_brief.html
mathematicians and computerscientists concerning cryptography and to fulfill his interest in thedissemination of information about cryptography, Appellant Karn, asoftware engineer
http://www.columbia.edu/kermit/ftp/ucsterminal/ucsterminal_03.txthttp://www.columbia.edu/kermit/ftp/ucsterminal/ucsterminal_03.txt
predate electronic computers by some decades; the Teletype (used as the control terminal on many mainframes and most minicomputers in the 1950s through 1970s) dates back to 1929.
Croatia - Russiahttps://www.croatianhistory.net/etf/russia.html
the creators of modern computers. Feller was awarded the National Medal of Science of the USA in 1969. He was in touch with his relatives in Zagreb, as well as with his colleagues
Croatia - Russia: overview of historical and cultural relations - a sketch
Xenopsychologyhttp://rfreitas.com/Astro/Xenopsychology.htm
biological computers, each with its own special intelligence, its own subjectivity, its own sense of time and space, its own memory, motor, and other functions. Thus we are obliga
http://www.columbia.edu/kermit/ftp/ucsterminal/ucsterminal.txthttp://www.columbia.edu/kermit/ftp/ucsterminal/ucsterminal.txt
predate electronic computers by some decades; the Teletype (used as the control terminal on many mainframes and most minicomputers in the 1950s through 1970s) dates back to 1929.
alt.2600 FAQ, Beta .013 - Part 1/1http://webarchive.me/geocities/SiliconValley/2072/2600faq.txt
Nietzsche Section A: Computers 01. How do I access the password file under Unix? 02. How do I crack Unix passwords? 03. What is password shadowing? 04. Where can I find the passwo
http://www.worldofradio.com/dxld3136.txthttp://www.worldofradio.com/dxld3136.txt
there were no computers, no camcorders, no television sets. To see a movie, we had to go to the theater downtown. To listen to music, we had to turn on the radio or put an easily
Hyperworlds - Web Replacement Projectshttp://hyperworlds.org/
of millions of computers by combining them into a virtual supercomputer. If you need more processing power, your program spawns more programs on any connected computer and returns
Website Accessibility Conformance Evaluation Methodology (WCAG-EM) 1.0https://www.w3.org/TR/WCAG-EM/
both the users and the computers used to access the website are known, this baseline may be limited to the operating systems, web browsers and assistive technologies used within t
Prof. Dr. Guido Salvaneschi | Programming Grouphttps://programming-group.com/members/salvaneschi
IEEE Transactions on Computers Elsevier Journal of Computer Languages Elsevier Knowledge-based Engineering IEEE Internet Computing ACM Transactions on Autonomous and Adaptive Syst
Profile of Prof. Dr. Guido Salvaneschi, Head of the Programming Group.
3D Gopher, by McCahill and Ericksonhttp://www.pliant.org/personal/Tom_Erickson/GopherVR.html
Icons. Journal of Human-Computer Interaction , 4:1. Lawrence Erlbaum Associates. Gaver, W. W., O'Shea, T. & Smith, R. B. (1991) Effective Sounds in Complex Systems: The ARKola
Find more...