Evaluation of user interface design is usually based on usability testing methods. In this paper we analyzed and described the user behavior in the form of the user model. The use...
: User interfaces to WWW search engines typically present results as ranked lists of documents. Such lists give users little help in understanding document variation: we propose a ...
Ivan Bretan, Johan Dewe, Anders Hallberg, Niklas W...
Distributedsoftwareenvironmentsareincreasinglycomplex anddiculttomanage,astheyintegratevariouslegacysoftware with specic management interfaces. Moreover, the factthatmanagementtas...
Laurent Broto, Daniel Hagimont, Patricia Stolf, No...
To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools th...
This paper makes two main contributions towards establishing support for application-specific factors in middleware security mechanisms. First, it develops a simple classification...