Search Results for 'User-Thinking'

User-Thinking published presentations and documents on DocSlides.

Banking and Bookkeeping
Banking and Bookkeeping
by liane-varnes
Tyler Moore. CS7403 University of Tulsa. Reading:...
DSL Access Architectures and Protocols
DSL Access Architectures and Protocols
by tawny-fly
xDSL. Architecture. Broadband Remote Access Serv...
PCS Securities Ltd.
PCS Securities Ltd.
by alexa-scheidler
Presents. LD Client . Level. Back Office Softwar...
Keyboarding
Keyboarding
by liane-varnes
Class – Mrs. Brown and Mrs. . Woolard. . Credi...
1   Web Basics
1 Web Basics
by calandra-battersby
Slides adapted from . Information Retrieval and W...
Independent Study
Independent Study
by karlyn-bohler
QuickTransfer. Piush Srivastava. The email applic...
Writing ODK Surveys in XLSFORM
Writing ODK Surveys in XLSFORM
by debby-jeon
Dr. Michael Marks. London School of Hygiene &...
Session #INN104
Session #INN104
by jane-oiler
UX Process—. What Can We Learn and Leverage? . ...
What do you recommend?
What do you recommend?
by jane-oiler
THOSE … THIS … THAT. 1. what . you’ll read ...
Smart Kitchen
Smart Kitchen
by tatiana-dople
(Ambient Assisted Living). Ameya Daphalapurkar. 1...
Lujun Fang, Kristen
Lujun Fang, Kristen
by sherrill-nordquist
LeFevre. University of Michigan, Ann Arbor. . Pr...
Dan Davy-Thorburn | Creative Partnerships Manager
Dan Davy-Thorburn | Creative Partnerships Manager
by lindy-dunigan
Creative . Innovations 2011. USE THE SPACE. GRA...
Community Detection in Political Twitter Networks using Non
Community Detection in Political Twitter Networks using Non
by faustina-dinatale
Mert Ozer. Nyunsu. Kim. Hasan . Davulcu. Motivat...
Virtual user generator (
Virtual user generator (
by ellena-manuel
vugen. ). Load Runner’s Scripting Component. HO...
Context-aware Social Discovery
Context-aware Social Discovery
by sherrill-nordquist
& Opportunistic Trust. Ahmed . Helmy. Nomads....
Badrish Chandramouli
Badrish Chandramouli
by briana-ranney
, Jonathan Goldstein, Mike Barnett, Rob DeLine,. ...
FM Transmitter for Raspberry Pi on Secure Unix Systems
FM Transmitter for Raspberry Pi on Secure Unix Systems
by luanne-stotts
BY Kyle Martin. Supervisor:. Dr Jean-. Baka. . D...
Performance of Recommender Algorithms on Top-N Recommendati
Performance of Recommender Algorithms on Top-N Recommendati
by aaron
Gabriel Vargas Carmona. 22.06.12. Agenda. Introdu...
Building a Gamification Framework on DNN
Building a Gamification Framework on DNN
by luanne-stotts
Scott McCulloch. F5 Networks. s.mcculloch@f5.com....
Project 2: Generating User-Tailored Floor Maps
Project 2: Generating User-Tailored Floor Maps
by olivia-moreira
Presented by:. Jarrett Baugh, Melody . Budiono. ,...
Online Applications
Online Applications
by conchita-marotz
Login / Register. If a student has already regist...
Swipes for Advice
Swipes for Advice
by trish-goza
Client server application. Client:. . Android ph...
Spring 2011
Spring 2011
by debby-jeon
6.813/6.831 User Interface Design and Implementat...
Mobile Interfaces
Mobile Interfaces
by alida-meadow
Introduction to Mobile. Rethinking mobile technol...
Spectator: Detection and Containment of JavaScript Worms
Spectator: Detection and Containment of JavaScript Worms
by alexa-scheidler
By . Livshits. & Cui. Presented by Colin. Th...
Kostadin Georgiev, VMware Bulgaria
Kostadin Georgiev, VMware Bulgaria
by lindy-dunigan
Preslav. . Nakov. , Qatar Computing Research Ins...
Design and Analysis of Large Scale Log Studies
Design and Analysis of Large Scale Log Studies
by giovanna-bartolotta
A CHI 2011 course. v11. Susan . Dumais. , Robin J...
A Site for All Eyes –
A Site for All Eyes –
by stefany-barnette
Considerations for Responsive Design. October 19,...
Texas Skyward User Group Conference
Texas Skyward User Group Conference
by tatyana-admore
Create Your Own PGP Using Custom Forms. Michelle ...
Command / Query Responsibility Segregation
Command / Query Responsibility Segregation
by min-jolicoeur
Udi Dahan – The Software Simplist. Session Code...
Sensor-based
Sensor-based
by cheryl-pisano
Mobile Web Fingerprinting and Cross-site Input In...
Interactive Inverse 3D Modeling
Interactive Inverse 3D Modeling
by trish-goza
James Andrews. Hailin. Jin. Carlo . S. é. quin....
An Interdisciplinary Perspective on IR
An Interdisciplinary Perspective on IR
by yoshiko-marsland
Susan Dumais. Microsoft Research. SIGIR 2009. Sal...
CrowdLogger as a Community Platform for Searcher Behavior E
CrowdLogger as a Community Platform for Searcher Behavior E
by luanne-stotts
Henry Feild. Center for Intelligent Information R...
ILTA: Office 365 Primer
ILTA: Office 365 Primer
by conchita-marotz
Marcus Bluestein/ Rob Brindell. 02.11.2014. Agend...
Web Wallet
Web Wallet
by stefany-barnette
Preventing Phishing Attacks by Revealing User Int...
Gang Wang
Gang Wang
by kittie-lecroy
, . Sarita. Y. . Schoenebeck. †. , Haitao . Zh...
A  Probabilistic Optimization Framework for the Empty-Answe
A Probabilistic Optimization Framework for the Empty-Answe
by luanne-stotts
Davide Mottin, Alice . Marascu. , . Senjuti. . B...
University Library System, University of Pittsburgh
University Library System, University of Pittsburgh
by natalia-silvester
October – November 2011. Future Search orientat...
Potential financial motivations
Potential financial motivations
by marina-yarberry
for end-user programming. Christopher . Scaffidi....