Sciweavers

379 search results - page 23 / 76
» Usability testing: what have we overlooked
Sort
View
NBIS
2009
Springer
14 years 2 months ago
Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison
Abstract—The operation of achieving authenticated key agreement between two human-operated mobile devices over a short range wireless communication channel, such as Bluetooth or ...
Ambarish Karole, Nitesh Saxena
AUSAI
2004
Springer
14 years 1 months ago
Domain-Adaptive Conversational Agent with Two-Stage Dialogue Management
The conversational agent understands and provides users with proper information based on natural language. Conventional agents based on pattern matching have much restriction to ma...
Jin-Hyuk Hong, Sung-Bae Cho
ICST
2009
IEEE
14 years 2 months ago
On the Effectiveness of Test Extraction without Overhead
Developers write and execute ad-hoc tests as they implement software. While these tests reflect important insights of the developers (e.g., which parts of the software need testi...
Andreas Leitner, Alexander Pretschner, Stefan Mori...
VRCAI
2004
ACM
14 years 1 months ago
Explorative construction of virtual worlds: an interactive kernel approach
Despite steady research advances in many aspects of virtual reality, building and testing virtual worlds remains to be a very difficult process. Most virtual environments are stil...
Jinseok Seo, Gerard Jounghyun Kim
IJSN
2006
65views more  IJSN 2006»
13 years 7 months ago
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
: In order to conceal their identity and origin, network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate `stepping ...
Xinyuan Wang