A summary of the mistakes researchers make when analysing likert type data and what the correct methods should be.
Judy Robertson From BLOG@CACM | April 4, 2011 at 10:01 AM
This is an article describing some recent (and bizarre) interfaces to support cooking. The intersection of computer science and culinary art is not as small as...Judy Robertson From BLOG@CACM | February 19, 2011 at 09:31 AM
As the recent performance of IBM's Watson system on the game show Jeopardy! illustrated, the combination of large-scale data, rich algorithm suites and powerful...Daniel Reed From BLOG@CACM | February 18, 2011 at 04:17 PM
In only a couple years, improved smartphones and laptops have closed the niche that netbooks lived in. Rather than mourn the loss of netbooks, let's celebrate their...Greg Linden From BLOG@CACM | February 15, 2011 at 04:10 PM
What's the relationship between functionality and design? What kinds of factors influence whether people do or don't adopt a technology?Jason Hong From BLOG@CACM | February 6, 2011 at 10:03 PM
Betwixt and between ubiquitous consumer software and the ethereal realm of ultra-high-performance computing, lies the excluded middle, the world of day-to-day computational...Daniel Reed From BLOG@CACM | October 24, 2010 at 09:20 PM
UIST 2010 has concluded with Jaron Lanier's inspiring and profound keynote after another set of paper presentations demonstrating innovative UI technology.
Langxuan "James" Yin From BLOG@CACM | October 7, 2010 at 09:23 PM
The Grace Hopper Celebration of Women in Computing had two special technical tracks added to this year's program: open source and human-computer interaction (HCI)...Gail Carmichael From BLOG@CACM | October 6, 2010 at 09:41 PM
We started the day at the beautiful Judson Memorial Church, crowded with more than 300 people attending UIST 2010, which is a new record.
Jessica Cauchard From BLOG@CACM | October 6, 2010 at 09:35 PM
Two papers about enhanced mouse cursors quickly drew my attention today. I briefly introduce these papers among other interesting topics of the second day of UIST...Langxuan "James" Yin From BLOG@CACM | October 6, 2010 at 09:45 PM
Social computing remains a hot research topic, and basic research on understanding group decision making and conditions under which crowdsourcing can lead to advantages...Ed H. Chi From BLOG@CACM | September 1, 2010 at 04:22 PM
Previously, I asked the question of why great design is so hard to integrate in organizations. In this article, I take a look at how Apple does design, and what...Jason Hong From BLOG@CACM | August 23, 2010 at 11:28 AM
An iconic cartoon by Peter Steiner, which appeared in The New Yorker in 1993, captured the nature of the nascent Internet. It shows a dog seated at a computer,...Daniel Reed From BLOG@CACM | August 8, 2010 at 05:04 PM
Why is good design so hard to accomplish for organizations? People are coming to the realization that design really matters, but it's not that they don't want to...Jason Hong From BLOG@CACM | July 21, 2010 at 09:50 AM
Why is there so little research into interface design for new mothers? Interface designers—hear my cry! Here are some pointers for designing interfaces for mothers...Judy Robertson From BLOG@CACM | July 6, 2010 at 10:53 AM
A quick look at this special event in Colombia at which people breathe, eat, and sweat technology.Carlos Brewer From BLOG@CACM | July 1, 2010 at 09:53 AM
One of the goals of this years Computers Freedom and Privacy conference is to ask the question, "Can we be 'smart' and private?" Wednesday's panel onIntellegent...Katy Nelson From BLOG@CACM | June 16, 2010 at 10:11 AM
The Computers Freedom and Privacy Conference (CFP) continued Tuesday afternoon with a panel called Activism and Social Networking: Advocating for Privacy. Panelists...Katy Nelson From BLOG@CACM | June 15, 2010 at 10:03 PM