Sciweavers

4445 search results - page 8 / 889
» Reflective Authorization Systems
Sort
View
HT
2000
ACM
14 years 2 months ago
Generating presentation constraints from rhetorical structure
Hypermedia structured in terms of the higher-level intent of its author can be adapted to a wider variety of final presentations. Many multimedia systems encode such highlevel int...
Lloyd Rutledge, Brian Bailey, Jacco van Ossenbrugg...
USS
2008
14 years 3 days ago
Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST
The State of Ohio commissioned the EVEREST study in late summer of 2007. The study participants were charged with an analysis of the usability, stability, and security of all voti...
Kevin R. B. Butler, William Enck, Harri Hursti, St...
NORDICHI
2006
ACM
14 years 3 months ago
User sketches: a quick, inexpensive, and effective way to elicit more reflective user feedback
Our aim is to introduce techniques that allow for active involvement of users throughout the design process, starting with the very early stages of ideation and exploration. The a...
Maryam Tohidi, William Buxton, Ronald Baecker, Abi...
BCSHCI
2007
13 years 11 months ago
Design in evaluation: reflections on designing for children's technology
This paper reflects on the design value that emerges from evaluation methods used in the field of child computer interaction. The work is based around an evaluation study of a tan...
Emanuela Mazzone, Diana Yifan Xu, Janet C. Read
AUSDM
2007
Springer
64views Data Mining» more  AUSDM 2007»
14 years 4 months ago
Reflection on Development and Delivery of a Data Mining Unit
Educators developing data mining courses face a difficult task of designing curricula that are adaptable, have solid foundations, and are tailored to students from different acade...
Bozena Stewart