Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for ''
published presentations and documents on DocSlides.
USABILITY AND THE WEB LIBRARIAN
by hoodrona
JUNIOR TIDAL. ASSOCIATE PROFESSOR, WEB SERVICES &a...
Week 15 LBSC 671 Creating Information Infrastructures
by alida-meadow
The User Experience. Tonight. Information archite...
Design of Large Scale Log Analysis Studies
by giovanna-bartolotta
A short tutorial…. Susan . Dumais. , Robin Jeff...
Reputation and Virtue Mobile Application Pitch by Gabriel Rendek
by lindy-dunigan
The Purpose. A game, available for smartphone or ...
Medical Applications Tejinder Judge
by tawny-fly
Usable Security – CS 6204 – Fall, 2009 – De...
Lecture Set 3 Introduction to Visual Basic Concepts
by liane-varnes
Part A – User Interfaces and Windows Forms – ...
Cloak and Dagger From two permissions to complete Control of the
by pasty-toler
ui. feedback loop. Presentation based on researc...
Chapter 4-Finding out about tasks
by test
and . work . Chapter 5 -Requirements . gathering:...
User Experience Management in Smart Washroom
by karlyn-bohler
CONCEIVE. Solution must be customizable for flexi...
Chapter One Unser Interface
by lindy-dunigan
Designing the User Interface. Importance of Good ...
SDS/2 2015 Connections Luis Torres
by min-jolicoeur
. The Steel Detailers. Stephanie Haith. . Desig...
FM Transmitter for Raspberry Pi on Secure Unix Systems
by giovanna-bartolotta
BY Kyle Martin. Supervisor:. Dr Jean-. Baka. . D...
LIGHTWEIGHT CLOUD COMPUTING FOR
by olivia-moreira
FAULT-TOLERANT. . DATA STORAGE MANAGEMENT. by. P...
USABILITY AND THE WEB LIBRARIAN
by pasty-toler
JUNIOR TIDAL. ASSOCIATE PROFESSOR, WEB SERVICES &...
Human Computer
by debby-jeon
Interface. INT211. What is HCI. Sometimes called ...
Heuristic Evaluation 3
by trish-goza
CPSC 481: HCI I. Fall 2014. 1. Anthony Tang with ...
Membangun
by tawny-fly
. Web . Site“Cantik. ”. Teguh Sutanto. , . S...
1 Quick, turn off the burner!!
by pamella-moone
Heuristic Evaluation 3. CPSC 481: HCI I. Fall 201...
An Introduction to Data-Informed Design
by lindy-dunigan
By Josephine M. Giaimo, MS. March 14, 2014. Desig...
Order of Presentations
by yoshiko-marsland
Hot-Cold. MuSearch. JABB. SoundTown. RileyBoard. ...
Privacy and User Trust in Context-Aware
by conchita-marotz
Systems. Saskia Koldijk. 1,2. , . Gijs . Koot. 2....
Prototype, UI,
by debby-jeon
Ux. , and Risks. Supannika Koolmanojwong. CS577. ...
FM Transmitter for Raspberry Pi on Secure Unix Systems
by luanne-stotts
BY Kyle Martin. Supervisor:. Dr Jean-. Baka. . D...
Mobile Interfaces
by alida-meadow
Introduction to Mobile. Rethinking mobile technol...
Design and Analysis of Large Scale Log Studies
by giovanna-bartolotta
A CHI 2011 course. v11. Susan . Dumais. , Robin J...
INTERFACES AND
by mitsue-stanley
INTERACTIONS. Chapter 6. Patrick . Hutto. Dongjin...
Usability engineering
by tawny-fly
Lecture 8. Jakob. Nielsen…. Q: . How many pro...
The Intersection of Library Science
by alida-meadow
and User Experience. A presentation to LIS650: Pa...
The Structure of the User Interface
by natalia-silvester
Lecture # 9. Gabriel Spitz. Driving Customer Expe...
SE 204, IES 506 – Human Computer Interaction
by giovanna-bartolotta
Lecture . 2: Usability of Interactive Systems. Le...
1 Usability evaluation and testing
by phoebe-click
User interfaces. Jaana Holvikivi. Metropolia. 2. ...
Catch A Ride
by debby-jeon
Ashwini, Keith, Jarret. Overall Problem and Solut...
1 Lecture 9:
by giovanna-bartolotta
Evaluation Using. Heuristic Analysis. Brad Myers....
User Interface
by pasty-toler
The conveyor line . is an essential part in the m...
1 Chapter 14
by natalia-silvester
. Construct, Deliver, and Maintain Systems Proj...
The Design of a Cryptography Based Secure File System
by giovanna-bartolotta
By ....
CS 321: Human-Computer Interaction Design
by trish-goza
February 10, 2016. Usability Testing. Research Me...
Brief View In Prioritizing Website Security
by myesha-ticknor
nitrob@synfyre.net. ROOTCON 6; Sept. 7-8, Present...
Prototype, UI,
by danika-pritchard
Ux. , and Risks. Supannika Koolmanojwong. CS577. ...
Human Computer Interaction
by jane-oiler
The Interaction. The Interaction. interaction mod...
Load More...