Sciweavers

792 search results - page 95 / 159
» Interview
Sort
View
SIGDOC
2006
ACM
14 years 3 months ago
What users say they want in documentation
While earlier work provided a partial view of users’ preferences about manuals, for most users in most work contexts the important question remains open: What do users want in d...
David G. Novick, Karen Ward
SOUPS
2006
ACM
14 years 3 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
UIST
2006
ACM
14 years 3 months ago
CINCH: a cooperatively designed marking interface for 3D pathway selection
To disentangle and analyze neural pathways estimated from magnetic resonance imaging data, scientists need an interface to select 3D pathways. Broad adoption of such an interface ...
David Akers
APSEC
2005
IEEE
14 years 3 months ago
An Industrial Case Study on Requirements Volatility Measures
Requirements volatility is an important risk factor for software projects. Software measures can help in quantifying and predicting this risk. In this paper, we present an industr...
Annabella Loconsole, Jürgen Börstler
DEXAW
2005
IEEE
135views Database» more  DEXAW 2005»
14 years 3 months ago
Expert-Based Ontology Construction: A Case-Study in Horticulture
Abstract— Experts are capable of performing complex tasks in their specific field of expertise. To do this, they use a vast amount of explicit and tacit domain knowledge. For v...
Nicole J. J. P. Koenderink, Jan L. Top, Lucas J. v...