• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,588
Next 10 →

END-USER PROTOTYPING: SOPHISTICATED USERS SUPPORTING

by System Developmen T, Nava Pliskin, Peretz Shova L
"... An accepted assumption underlying application develop-ment is that the user is naive, with little understanding o f data processing. All the methods for handling the informa-tion system development process, from structured analysi s to prototyping, have in common a concern with user/de-veloper commu ..."
Abstract - Add to MetaCart
. Moreover, sophisticated informatio n center veterans, as well as microcomputer users, can an d do contribute to system development. Thee are capable of preliminary experimentation with system requirements, i n particular those related to user interface. Thus, the concept of end-user prototyping

Experiences Integrating Sophisticated User Experience Design Practices into Agile Processes

by Paul Hodgetts - In: Agile Development Conference - ADC
"... Most significant software processes involve a wide range of disciplines, from programming to testing, and from documentation to database development. Unfortunately, agile processes are typically presented from the point of view of programmers, with the other disciplines often left feeling excluded a ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
and disenfranchised. One such discipline is that of user experience design (often abbreviated UED), a discipline encompassing several key specialties including user research, interface design, visual design and usability testing. UED activities span the full lifecycle of product development from early requirements

Data Preparation for Mining World Wide Web Browsing Patterns

by Robert Cooley, Bamshad Mobasher, Jaideep Srivastava - KNOWLEDGE AND INFORMATION SYSTEMS , 1999
"... The World Wide Web (WWW) continues to grow at an astounding rate in both the sheer volume of tra#c and the size and complexity of Web sites. The complexity of tasks such as Web site design, Web server design, and of simply navigating through a Web site have increased along with this growth. An i ..."
Abstract - Cited by 567 (43 self) - Add to MetaCart
. An important input to these design tasks is the analysis of how a Web site is being used. Usage analysis includes straightforward statistics, such as page access frequency, as well as more sophisticated forms of analysis, such as finding the common traversal paths through a Web site. Web Usage Mining

Towards an Active Network Architecture

by David L. Tennenhouse, David J. Wetherall - Computer Communication Review , 1996
"... Active networks allow their users to inject customized programs into the nodes of the network. An extreme case, in which we are most interested, replaces packets with "capsules" -- program fragments that are executed at each network router/switch they traverse. Active architectures permit ..."
Abstract - Cited by 497 (7 self) - Add to MetaCart
Active networks allow their users to inject customized programs into the nodes of the network. An extreme case, in which we are most interested, replaces packets with "capsules" -- program fragments that are executed at each network router/switch they traverse. Active architectures permit

Relational Databases for Querying XML Documents: Limitations and Opportunities

by Jayavel Shanmugasundaram, Kristin Tufte, Gang He, Chun Zhang, David DeWitt, Jeffrey Naughton , 1999
"... XML is fast emerging as the dominant standard for representing data in the World Wide Web. Sophisticated query engines that allow users to effectively tap the data stored in XML documents will be crucial to exploiting the full power of XML. While there has been a great deal of activity recently prop ..."
Abstract - Cited by 478 (9 self) - Add to MetaCart
XML is fast emerging as the dominant standard for representing data in the World Wide Web. Sophisticated query engines that allow users to effectively tap the data stored in XML documents will be crucial to exploiting the full power of XML. While there has been a great deal of activity recently

Improv: A System for Scripting Interactive Actors in Virtual Worlds

by Ken Perlin, Athomas Goldberg , 1996
"... Improv is a system for the creation of real-time behavior-based animated actors. There have been several recent efforts to build network distributed autonomous agents. But in general these efforts do not focus on the author's view. To create rich interactive worlds inhabited by believable anima ..."
Abstract - Cited by 397 (0 self) - Add to MetaCart
animated actors, authors need the proper tools. Improv provides tools to create actors that respond to users and to each other in real-time, with personalities and moods consistent with the author's goals and intentions. Improv consists of two subsystems. The first subsystem is an Animation Engine

Why phishing works

by Rachna Dhamija, J. D. Tygar - In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems , 2006
"... To build systems shielding users from fraudulent (or phishing) websites, designers need to know which attack strategies work and why. This paper provides the first empirical evidence about which malicious strategies are successful at deceiving general users. We first analyzed a large set of captured ..."
Abstract - Cited by 346 (4 self) - Add to MetaCart
at browser-based cues such as the address bar, status bar and the security indicators, leading to incorrect choices 40 % of the time. We also found that some visual deception attacks can fool even the most sophisticated users. These results illustrate that standard security indicators are not effective for a

PETSc users manual

by Satish Balay, Kris Buschelman, Victor Eijkhout, Dinesh Kaushik, Matt Knepley, Lois Curfman Mcinnes, Barry Smith, Hong Zhang - ANL-95/11 - Revision 2.1.0, Argonne National Laboratory , 2001
"... tract W-31-109-Eng-38. 2 This manual describes the use of PETSc for the numerical solution of partial differential equations and related problems on high-performance computers. The Portable, Extensible Toolkit for Scientific Compu-tation (PETSc) is a suite of data structures and routines that provid ..."
Abstract - Cited by 282 (20 self) - Add to MetaCart
particular problem. By using techniques of object-oriented programming, PETSc provides enormous flexibility for users. PETSc is a sophisticated set of software tools; as such, for some users it initially has a much steeper

Efficient Filtering of XML Documents for Selective Dissemination of Information

by Mehmet Altınel , 2000
"... Information Dissemination applications are gaining increasing popularity due to dramatic improvements in communications bandwidth and ubiquity. The sheer volume of data available necessitates the use of selective approaches to dissemination in order to avoid overwhelming users with unnecessaryi ..."
Abstract - Cited by 364 (17 self) - Add to MetaCart
Information Dissemination applications are gaining increasing popularity due to dramatic improvements in communications bandwidth and ubiquity. The sheer volume of data available necessitates the use of selective approaches to dissemination in order to avoid overwhelming users

The Social Context of User Sophistication*

by Eszter Hargittai
"... There is a growing body of literature on how people use the Web and in particular on what types of content people view online. Such work takes for granted that people have ready access to all that the Web has to offer. Such an approach assumes that the billions of Web pages that are technically avai ..."
Abstract - Add to MetaCart
available online are realistically within the reach of users. However, little work has considered how people’s online use patterns may be limited by the scope of their ability to locate various types of content on the Web. This project fills a gap in the literature by looking at people’s online skills. A
Next 10 →
Results 1 - 10 of 3,588
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University