Sciweavers

274 search results - page 9 / 55
» Security user studies: methodologies and best practices
Sort
View
CHI
2010
ACM
14 years 2 months ago
Understanding usability practices in complex domains
Although usability methods are widely used for evaluating conventional graphical user interfaces and websites, there is a growing concern that current approaches are inadequate fo...
Parmit K. Chilana, Jacob O. Wobbrock, Andrew J. Ko
ACMSE
2008
ACM
13 years 9 months ago
Education and design: using human-computer interaction case studies to learn
As computers become increasingly integral to daily life there is a need for computer scientists to focus on the user. This, in part, entails developing applications that have inte...
Gregory Smith, Laurian C. Vega, D. Scott McCrickar...
IROS
2007
IEEE
162views Robotics» more  IROS 2007»
14 years 1 months ago
Comparative evaluation of robotic software integration systems: A case study
— One might expect that after nearly 50 years of research in robot manipulation and mobile robotics the architectural design of robot systems has converged to a small set of best...
Azamat Shakhimardanov, Erwin Prassler
ANSOFT
2002
171views more  ANSOFT 2002»
13 years 7 months ago
OPM/Web - Object-Process Methodology for Developing Web Applications
Web applications can be classified as hybrids between hypermedia and information systems. They have a relatively simple distributed architecture from the user viewpoint, but a comp...
Iris Reinhartz-Berger, Dov Dori, Shmuel Katz
EUROCRYPT
2006
Springer
13 years 11 months ago
Cryptography in Theory and Practice: The Case of Encryption in IPsec
Abstract. This paper studies the gaps that exist between cryptography as studied in theory, as defined in standards, as implemented by software engineers, and as actually consumed ...
Kenneth G. Paterson, Arnold K. L. Yau