Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'User-Models'
User-Models published presentations and documents on DocSlides.
Interface Design Guidelines
by kittie-lecroy
Blame the Design, not the User. Tractors. Early d...
FORCEPOINT
by luanne-stotts
Protecting the Human Point. Fabiano Finamore – ...
anonymous
by trish-goza
. routing. . and. mix nets (Tor). Yongdae. . ...
Yochay Kiriaty
by phoebe-click
Microsoft. @. yochayk. http://windowsteamblog.com...
How Sunrise Health Region is Improving the Clinician Experi
by marina-yarberry
and Simple . VDI - Update. Sponsored By:. Sherang...
Other projects have been highly-specified. For this one, y
by tatiana-dople
GUI-based program. Check the words of a text file...
Student: Jihaad Pienaar
by calandra-battersby
Supervisor: . Mr. . Mehrdad. . Ghaziasgar. . C...
EC10 OUTPUT
by sherrill-nordquist
Lift Control Management. Floor Button. Panel. Whe...
Hackathons
by aaron
for . Scientific Software. How and When do they ...
Library Utensils
by debby-jeon
Library Utensils. It is a concept device, that us...
1 Quick, turn off the burner!!
by luanne-stotts
Heuristic Evaluation 3 - Exercises. Split classâ€...
Changing Information
by kittie-lecroy
Behaviours. :. Making Library Content Appeal to ....
Quid Usage
by stefany-barnette
Some Important terms:. Login. : login is accessin...
Jill A.
by mitsue-stanley
Crussemeyer. , Ph.D., MLIS; Judy Kraemer, MLIS, M...
Day 11
by yoshiko-marsland
Processes. Operating Systems Control Tables. Proc...
New Product Development
by jane-oiler
Rendezvous. Rendezvous. Moving Forward. Panel Wal...
1 Quick, turn off the burner!!
by pamella-moone
Heuristic Evaluation 3. CPSC 481: HCI I. Fall 201...
Quantifying Location Privacy
by tawny-fly
Reza Shokri, George . Theodorakopoulos. , Jean-Yv...
Meltem Dincer
by jane-oiler
, VP Platform Capabilities, John Wiley and Sons. ...
INFO3315 Week 4
by alida-meadow
Personas, Tasks. Guidelines, Heuristic Evaluation...
Programmatic mastery
by jane-oiler
28 . June 2016. Week 1, Day . 2 . Day 1 Recap. Re...
ESTABLISHING REQUIREMENTS
by alida-meadow
A simple interaction design lifecycle model. Exem...
An Introduction to Data-Informed Design
by lindy-dunigan
By Josephine M. Giaimo, MS. March 14, 2014. Desig...
Microsoft Instant Messenger Communication Network
by trish-goza
How does the world communicate?. Jure . Leskovec....
CONTENT MANAGEMENT SYSTEM
by yoshiko-marsland
Presented by. : . Mukesh. A. . Pund. Principal S...
Advanced GUI’s
by myesha-ticknor
Christopher Budo, Davis Nygren, spencer franks, L...
Will P2P Users Cooperate with ISPs?
by celsa-spraggs
A Word-of-Mouth Communication Approach. Piotr. ....
How Completely and Similarly Do Safety Authorities Address
by aaron
Anastasios Plioutsias (Technical University of At...
Ticket #46
by myesha-ticknor
Clarify error responses and allow non-HTTP error ...
Automatic Construction of
by trish-goza
Topic . Maps for Navigation in Information Space ...
Programming by Examples
by lois-ondreau
Marktoberdorf Lectures. August 2015. Sumit Gulwan...
Order of Presentations
by yoshiko-marsland
Hot-Cold. MuSearch. JABB. SoundTown. RileyBoard. ...
S UPER
by liane-varnes
V. ISION. Detection and Control of In-Sight and O...
The APEX
by sherrill-nordquist
framework: prototyping . of ubiquitous environmen...
OpenEdge
by alexa-scheidler
ABL Multi-Tenancy. ABL Multi-Tenant Programming....
Comprehensive User Profile Synchronization
by cheryl-pisano
Spencer . Harbar. Architect. SPC406. About Spence...
Privacy and User Trust in Context-Aware
by conchita-marotz
Systems. Saskia Koldijk. 1,2. , . Gijs . Koot. 2....
NIMAC for Publishers:
by aaron
How to Create Sub User Accounts . December 2015. ...
Managing Business Access Conflicts
by stefany-barnette
About Thirdware. 2. AUTOMOTIVE. ELECTRONICS. LIFE...
1 Robustness of handwriting recognition systems
by giovanna-bartolotta
What was all that direct manipulation mumbo-jumbo...
Load More...