Sciweavers

3042 search results - page 39 / 609
» Designing for all users: including the odd users
Sort
View
ACSAC
2005
IEEE
14 years 2 months ago
PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness
As evidenced by the proliferation of phishing attacks and keystroke loggers, we know that human beings are not wellequipped to make trust decisions about when to use their passwor...
Sara Sinclair, Sean W. Smith
ICSE
2001
IEEE-ACM
14 years 1 months ago
Functional Paleontology: System Evolution as the User Sees It
It has long been accepted that requirements analysis should precede architectural design and implementation, but in software evolution and reverse engineering this concern with bl...
Annie I. Antón, Colin Potts
CHI
2002
ACM
14 years 9 months ago
An evaluation of a multiple interface design solution for bloated software
This study examines a novel interface design for heavilyfeatured productivity software. The design includes two interfaces between which the user can easily toggle: (1) an interfa...
Joanna McGrenere, Ronald Baecker, Kellogg S. Booth
DSVIS
2008
Springer
13 years 10 months ago
Towards a Library of Workflow User Interface Patterns
Abstract. A collection of user interface design patterns for workflow information systems is presented. Each Workflow User Interface Pattern (WUIP) is characterized by properties e...
Josefina Guerrero García, Jean Vanderdonckt...
JUCS
2006
95views more  JUCS 2006»
13 years 8 months ago
POCA : A User Distributions Algorithm in Enterprise Systems with Clustering
Abstract: As enterprises worldwide race to improve real-time management to improve productivity, customer services and flexibility, huge resources have been invested into enterpris...
Ping-Yu Hsu, Ping-Ho Ting