Sciweavers

9124 search results - page 32 / 1825
» Requirements-Based Design Evaluation
Sort
View
CHI
2007
ACM
14 years 11 months ago
Protecting people from phishing: the design and evaluation of an embedded training email system
Phishing attacks, in which criminals lure Internet users to websites that impersonate legitimate sites, are occurring with increasing frequency and are causing considerable harm t...
Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acqu...
DSD
2007
IEEE
116views Hardware» more  DSD 2007»
14 years 5 months ago
Evaluating the Model Accuracy in Automated Design Space Exploration
Design space exploration is used to shorten the design time of System-on-Chips (SoCs). The models used in the exploration need to be both accurate and fast to simulate. This paper...
Kalle Holma, Mikko Setälä, Erno Salminen...
ISESE
2003
IEEE
14 years 4 months ago
An Experimental Evaluation of Inspection and Testing for Detection of Design Faults
The two most common strategies for verification and validation, inspection and testing, are in a controlled experiment evaluated in terms of their fault detection capabilities. Th...
Carina Andersson, Thomas Thelin, Per Runeson, Nina...
ASSETS
2006
ACM
14 years 2 months ago
Where's my stuff?: design and evaluation of a mobile system for locating lost items for the visually impaired
Finding lost items is a common problem for the visually impaired and is something that computing technology can help alleviate. In this paper, we present the design and evaluation...
Julie A. Kientz, Shwetak N. Patel, Arwa Z. Tyebkha...
CHI
2003
ACM
14 years 11 months ago
Taking email to task: the design and evaluation of a task management centered email tool
Email has come to play a central role in task management, yet email tool features have remained relatively static in recent years, lagging behind users' evolving practices. T...
Victoria Bellotti, Nicolas Ducheneaut, Mark Howard...