Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'User-Volunteer'
User-Volunteer published presentations and documents on DocSlides.
Ignite (Lightning)
by luanne-stotts
Talks. “How to give an Ignite Talk! (in Ignite ...
Planning the official release of
by yoshiko-marsland
RMG-. Py. issues . to resolve and issues to put o...
UX Winter 2013
by tatyana-admore
Guthrie. Steve Jobs. UX Examples. Cal Poly. Setti...
SafeNet MobilePKI for
by alida-meadow
BlackBerry. ®. SSO solution, . backed by strong ...
Evaluating Novelty
by lois-ondreau
and . Diversity. Charles. Clarke. School . of Co...
An Optimization of Collaborative Filtering Personalized Re
by celsa-spraggs
Xian . Jin. , Qin Zheng and Lily Sun. . ICISO 20...
ACRES
by calandra-battersby
Agricultural. . Contact Record Entry System. TEA...
Iñigo Lopez
by aaron
Principal Program Manager Lead. Acquiring users. ...
Location Privacy Protection for Smartphone Users
by calandra-battersby
Kassem. . Fawaz. and Kang G. Shin. Computer Sci...
Leveraging Statewide Virtualization And Emerging Technologi
by lindy-dunigan
. To Improve Education. April 23, 2012. Internet...
WHY WORRY ABOUT DRUGS AND ALCOHOL IN THE WORKPLACE?
by stefany-barnette
More than 70 percent of substance abusers hold jo...
Chat Application
by liane-varnes
with. ReactJS. , . Node.js. . and . Socket.IO. G...
Membangun
by tawny-fly
. Web . Site“Cantik. ”. Teguh Sutanto. , . S...
G GOV.UK Verify
by luanne-stotts
E-government Conference. December 2015. Robin Wal...
User Needs & Essential Water (Cycle) Variables (EWVs)
by alida-meadow
(1) Water Strategy Report (WSR)—GEOSS-Water-CoP...
Interface Design Guidelines
by kittie-lecroy
Blame the Design, not the User. Tractors. Early d...
FORCEPOINT
by luanne-stotts
Protecting the Human Point. Fabiano Finamore – ...
anonymous
by trish-goza
. routing. . and. mix nets (Tor). Yongdae. . ...
Yochay Kiriaty
by phoebe-click
Microsoft. @. yochayk. http://windowsteamblog.com...
How Sunrise Health Region is Improving the Clinician Experi
by marina-yarberry
and Simple . VDI - Update. Sponsored By:. Sherang...
Other projects have been highly-specified. For this one, y
by tatiana-dople
GUI-based program. Check the words of a text file...
Student: Jihaad Pienaar
by calandra-battersby
Supervisor: . Mr. . Mehrdad. . Ghaziasgar. . C...
EC10 OUTPUT
by sherrill-nordquist
Lift Control Management. Floor Button. Panel. Whe...
Hackathons
by aaron
for . Scientific Software. How and When do they ...
Library Utensils
by debby-jeon
Library Utensils. It is a concept device, that us...
1 Quick, turn off the burner!!
by luanne-stotts
Heuristic Evaluation 3 - Exercises. Split class...
Changing Information
by kittie-lecroy
Behaviours. :. Making Library Content Appeal to ....
Quid Usage
by stefany-barnette
Some Important terms:. Login. : login is accessin...
Conceptual Models &
by mitsue-stanley
Interface . Metaphors. November 3, 2015. Hall of ...
Jill A.
by mitsue-stanley
Crussemeyer. , Ph.D., MLIS; Judy Kraemer, MLIS, M...
Day 11
by yoshiko-marsland
Processes. Operating Systems Control Tables. Proc...
New Product Development
by jane-oiler
Rendezvous. Rendezvous. Moving Forward. Panel Wal...
1 Quick, turn off the burner!!
by pamella-moone
Heuristic Evaluation 3. CPSC 481: HCI I. Fall 201...
Quantifying Location Privacy
by tawny-fly
Reza Shokri, George . Theodorakopoulos. , Jean-Yv...
Meltem Dincer
by jane-oiler
, VP Platform Capabilities, John Wiley and Sons. ...
INFO3315 Week 4
by alida-meadow
Personas, Tasks. Guidelines, Heuristic Evaluation...
Programmatic mastery
by jane-oiler
28 . June 2016. Week 1, Day . 2 . Day 1 Recap. Re...
ESTABLISHING REQUIREMENTS
by alida-meadow
A simple interaction design lifecycle model. Exem...
An Introduction to Data-Informed Design
by lindy-dunigan
By Josephine M. Giaimo, MS. March 14, 2014. Desig...
Microsoft Instant Messenger Communication Network
by trish-goza
How does the world communicate?. Jure . Leskovec....
Load More...