Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for ''
published presentations and documents on DocSlides.
Sensor-based
by cheryl-pisano
Mobile Web Fingerprinting and Cross-site Input In...
Interactive Inverse 3D Modeling
by trish-goza
James Andrews. Hailin. Jin. Carlo . S. é. quin....
An Interdisciplinary Perspective on IR
by yoshiko-marsland
Susan Dumais. Microsoft Research. SIGIR 2009. Sal...
CrowdLogger as a Community Platform for Searcher Behavior E
by luanne-stotts
Henry Feild. Center for Intelligent Information R...
ILTA: Office 365 Primer
by conchita-marotz
Marcus Bluestein/ Rob Brindell. 02.11.2014. Agend...
Web Wallet
by stefany-barnette
Preventing Phishing Attacks by Revealing User Int...
Gang Wang
by kittie-lecroy
, . Sarita. Y. . Schoenebeck. †. , Haitao . Zh...
A Probabilistic Optimization Framework for the Empty-Answe
by luanne-stotts
Davide Mottin, Alice . Marascu. , . Senjuti. . B...
University Library System, University of Pittsburgh
by natalia-silvester
October – November 2011. Future Search orientat...
Potential financial motivations
by marina-yarberry
for end-user programming. Christopher . Scaffidi....
Database Security
by cheryl-pisano
Database Security. Multi-user database systems li...
Saansad
by test
. Adarsh. Gram . Yojana. Panchayat. . Darpan. ...
Danaos Technical Application
by trish-goza
Technical Support Department. Piraeus 02/06/2016....
SESSION TWO
by yoshiko-marsland
SECURITY AND GROUP PERMISSIONS. Security and Grou...
Proposal Template
by danika-pritchard
Title of Self-proposed Project. Introduction. B. ...
IoTSafe
by alexa-scheidler
: A Safe & Verified. . Security Controller. ...
Shaping Services from 2018
by lois-ondreau
Coproduction summary of findings. . OVERVIEW OF ...
Khalid El-Arini
by min-jolicoeur
Carnegie Mellon University. Joint work with:. Ulr...
User Interfaces
by celsa-spraggs
By Mathieu Leduc. What is the User Interface(UI)?...
Very Smart Narration
by jane-oiler
Tally Boys Presents. www.tallyboys.com. Using . T...
Measuring the End User
by cheryl-pisano
Geoff Huston. APNIC Labs, May 2015. The Internet ...
The Inductive Software Engineering Manifesto
by sherrill-nordquist
Principles for Industrial Data Mining. Paper Auth...
Grant Ingersoll
by lois-ondreau
Chief Scientist. Lucid Imagination. Enhancing Dis...
M2M implications
by mitsue-stanley
Rudolf van der Berg. rudolf.vanderberg@oecd.org. ...
Microkernels:
by luanne-stotts
mach. and L4. Hakim Weatherspoon. CS6410. 1. Dif...
User Search Behaviors:
by lindy-dunigan
Insights from Easy . Search Transaction Log . Ana...
SYST699 – Spec Innovations
by jane-oiler
Innoslate™ System Engineering Management Softwa...
INTERFACES AND
by mitsue-stanley
INTERACTIONS. Chapter 6. Patrick . Hutto. Dongjin...
Interface evaluation
by jane-oiler
An application of evaluative methods. Today’s t...
Explore-by-Example: An Automatic Query Steering Framework f
by tatiana-dople
By . Kyriaki. . Dimitriadou. , . Olga . Papaemma...
1 That
by briana-ranney
. is. . me. !. My. Road . to. . Sucess. . wi...
AUGMENTED
by stefany-barnette
AUTHENTICATION. FACE + A.I. + CONTEXT. the new cr...
AppInsight:
by jane-oiler
Mobile App Performance Monitoring in the Wild. Le...
Information Architecture and Navigation
by celsa-spraggs
Introduction to a spatial metaphor . Many user in...
Dr. Joy Pixley
by tatiana-dople
Project Manager, Social Sciences. California Plug...
A User
by giovanna-bartolotta
-Guided Approach to . Program . Analysis. Ravi . ...
Interactive Sense Feedback for Difficult Queries
by natalia-silvester
Alexander . Kotov. . and . ChengXiang. . Zhai. ...
1 User Services and Support for NESDIS Satellite Products a
by marina-yarberry
Matthew Seybold, User Services Coordinator. Natal...
A Behavioral Biometrics User Authentication Study
by briana-ranney
Using Android Device Accelerometer and Gyroscope ...
Compliance Training from
by conchita-marotz
Compliancy.Guru. The CHO: Code of Conduct – key...
Load More...