Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for ''
published presentations and documents on DocSlides.
Web Design
by alida-meadow
Basic Elements. What is Web Design. Design is the...
OS installation
by tawny-fly
Understandability. of . On-screen. . instructio...
INTERACTION PLAN PHASE
by trish-goza
Initial Design and Information Architecture. You ...
Mosaic: Quantifying Privacy Leakage in Mobile Networks
by briana-ranney
Institution. Authors. Northwestern University. Ni...
DIRAC Web User Interface
by sherrill-nordquist
A.Casajus. (. Universitat. de Barcelona). M.Sap...
Week11 –
by giovanna-bartolotta
2015. Usability Engineering. psychological and ph...
COMMUNICATIONSOF THE ACM March Vol
by alida-meadow
43 No 3 33 here is no Moores Law for user interfa...
General Safety Information These User Instructions are
by cheryl-pisano
User Instructions must always be available to the...
Accommodator
by tatiana-dople
duty of the to keep the records of their stay whic...
Steve Krug’s Web
by kittie-lecroy
. . Design principle . ....
1 AIS Development Strategies
by marina-yarberry
Chapter 19. Overview. Today we will cover:. (1)...
TOLL INFORMATION SYS
by liane-varnes
USER MANUAL TEM (Ju ly 2014) User Manual Ministry ...
1 Lecture 9:
by giovanna-bartolotta
Evaluation Using. Heuristic Analysis. Brad Myers....
Section 2.3 – Authentication Technologies
by alida-meadow
1. Authentication. The determination of . identit...
Authentication patterns
by faustina-dinatale
for . SharePoint 2013 and Office 365 . Nathan Mil...
Team Hammer
by natalia-silvester
Hackomotive. 2013. Ylondia Portis. Steve . Tu. S...
Online Identity Authentication and Data Broker
by danika-pritchard
SNAP Director’s Conference . September 23, 2013...
Tore Sundelin
by briana-ranney
Principal Lead Program Manager. Microsoft. The Pe...
Final Presentation:
by sherrill-nordquist
Morning Glass Surf Shop and Coffeehouse. Final Pr...
Fuddle
by sherrill-nordquist
Baris. . Tevfik. Matt Lee. David Cheung. Ben . P...
Intelligent Question Routing Systems - A Tutorial
by karlyn-bohler
Bojan Furlan, Bosko Nikolic, Veljko Milutinovic, ...
Modeling User Interactions
by giovanna-bartolotta
in Social Media. Eugene Agichtein. Emory Universi...
Search Engines
by sherrill-nordquist
Information Retrieval in Practice. All slides ©A...
Lender Online Training
by stefany-barnette
Nevada Housing Division. Loan Submission Training...
TeraGrid Science Gateway AAAA Model:
by lindy-dunigan
Implementation and Lessons Learned. Jim Basney. N...
Chapter 4
by kittie-lecroy
Authentication policy. Cyber Security for Educati...
User
by myesha-ticknor
experience. . with. . electric. . vehicles. ....
Adding Practical Security to Your Computer Course
by min-jolicoeur
Dr. Mark Ciampa. Western Kentucky University. 15...
Monalisa Sen
by lois-ondreau
STC India Chapter, 2012. Social Documentation-The...
V. Bellotti
by kittie-lecroy
, B. . Begole. , . et al. .. CHI 2008 Proceedings...
1 AIS Development Strategies
by briana-ranney
Chapter 19. Overview. Today we will cover:. (1)...
Disclaimer
by tawny-fly
© . 2015 John Straumann. . All rights reserved. ...
Web Privacy Topics
by yoshiko-marsland
Andy Zeigler. Senior Program Manager, Internet Ex...
Earthquake Shakes Twitter User:
by giovanna-bartolotta
Analyzing Tweets for Real-Time Event Detection. T...
Computer Fraud and Abuse Techniques
by phoebe-click
Chapter 6. 6-1. Learning Objectives. Compare and ...
Open Dialogue Management for Relational Databases
by giovanna-bartolotta
Ben . Hixon. , Rebecca J. . Passonneau. Jee Hyun ...
Final Project Presentation
by celsa-spraggs
Justin . Weist. IMD123. Week 6 Assignment 1. 1. T...
1 Lecture
by faustina-dinatale
8:. Evaluation Using. Heuristic Analysis. Brad My...
Heuristic
by min-jolicoeur
Evaluation:. Hotels.com . Presenters:. Varely Ca...
Enterprise
by marina-yarberry
Search -. How . to triage problems quickly and pr...
Load More...