This paper proposes a transformation of the Cognitive Walkthrough (CW), a theory-based usability inspection method that has proven useful in designing applications that support us...
Marilyn Hughes Blackmon, Peter G. Polson, Muneo Ki...
This paper reports the results of a study investigating the relevance criteria used by health care professionals when seeking medical images. Data was collected from 26 participan...
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
The popularity of video sharing platforms such as Youtube has prompted the need for the development of efficient techniques for multimedia identification. Content fingerprinting i...
: The reliability of a communications network is often evaluated without taking into account the economic consequence of failures. Here a new approach is proposed to assess the eco...