Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'User-Usability'
User-Usability published presentations and documents on DocSlides.
Design of Large Scale Log Analysis Studies
by giovanna-bartolotta
A short tutorial…. Susan . Dumais. , Robin Jeff...
Microsoft Teams Architecture
by karlyn-bohler
Tim Beamer, Microsoft Cloud Engineer, Plus Consul...
Big Data & Ads Jian Yuan, Facebook
by danika-pritchard
Why Bother with Ads at all?. "The best minds of m...
A Brief Introduction to the Internet
by lindy-dunigan
The Internet is a massive, world wide connection ...
ACME Priority Metrics Package
by sherrill-nordquist
A-PRIME. Kate Evans, . Milena . Veneziani. , . Sa...
iOS and AddressBook CS4521
by myesha-ticknor
Address Book UI Framework. Exploring Contacts. ...
Mobile Platform Security Models
by trish-goza
. John Mitchell. CS 155. Spring . 2015. Outl...
ODMAP Level 1 How to register and use
by olivia-moreira
ODMAP. for Fire/EMS and other partners . ODMAP . ...
Systems Software 1 Starter – give me an example of each of these. What are they?
by conchita-marotz
2. User interface. Peripheral. Operating System. ...
Cash Doctor Mobile Application 3.0
by mitsue-stanley
577A. Team 12. The Team. Steven. : . Project M...
HCL’s Strategic Direction
by lindy-dunigan
Krishnan . Chatterjee. . – Head, Digital Task ...
MANAGING IT SYSTEMS Top Things to Keep in Mind to Protect Yourself and Others
by calandra-battersby
1. P are one of the f...
Writing User Interfaces for 4 Platforms at Once
by tawny-fly
for MIT 6.470. January 16, 2013. . Dan Mascenik. ...
Measuring User Confidence in
by tatiana-dople
Smartphone Security and . Privacy . Abishek Rama...
Victor Matos Cleveland State University
by conchita-marotz
Portions of this page are reproduced from work cr...
A Survey of Mobile Phone Sensing
by yoshiko-marsland
Nicholas D. . Lane. Emiliano. . Miluzzo. Hong Lu...
Mobile Phone Security July 10, 2015
by celsa-spraggs
Design and User Acceptability Testing of Secure M...
What's new in XenApp :
by danika-pritchard
on-demand application delivery. Citrix . XenApp. ...
Tax Refund Calculator iPhone app
by cheryl-pisano
By: . Tuna Erdurmaz. Date. : . 12. th. . of Fe...
MANAGING IT SYSTEMS Top Things to Keep in Mind to Protect Yourself and Others
by mitsue-stanley
April 23 was Sunday. Email I Received. MANAGING I...
LSI-TA to VTAG Consolidation
by pamella-moone
CUA Guide. Summary. LSI-TA will be decommissioned...
Using Mobile Phones To Write In Air
by calandra-battersby
Chris . Coykendall. – ODU CS495. Introduction....
A Two-Dimensional Click Model for Query
by conchita-marotz
Auto-Completion . Yanen. Li. 1. , . Anlei. Dong...
Week1&2- Introduction to Mobile Application Development & Android Studio
by tatiana-dople
HNDIT2417. Mobile Application Development. Outlin...
WebDewey Number Building
by liane-varnes
Basics. November 2012. Overall workflow. Find st...
Threads Linked Lists structs
by pasty-toler
and memory layout. l. ist.next. l. ist.prev. l. ...
What is an Operating System?
by liane-varnes
The OS is a program. P. ermit . easy access, cont...
Future Data Access and Analysis Architectures
by olivia-moreira
– Discussion. Dr Robert Woodcock – WGISS 43. ...
Personalization, Socialization, and Recommendations in
by cheryl-pisano
Location-based Services 2.0. Mohamed F. . Mokbel....
Virtual Computing Laboratories
by marina-yarberry
Past, Present, and Future. . Stephen . D. . Bur...
Product Delivery and User Experience
by stefany-barnette
Goals:. (1. ) more effectively disseminate our . ...
CARA 3.10 Major New Features
by aaron
CARA 3.10 Major New Features. Summary. Descriptio...
LOCATOR ALARM AND DISTANCE FINDER USING NETWORK TOWER
by tawny-fly
Patented . Vide Indian Patent . Number : . 282621...
Wearable Computers BY: jIBAN
by olivia-moreira
JYOTI RANA. Reg.N0:0801307165. Branch: It. AGEND...
Location Privacy Protection for Smartphone Users
by karlyn-bohler
Kassem. . Fawaz. and Kang G. Shin. Computer Sci...
Introduction to Cyber Security
by natalia-silvester
― . To survive in IT society. . ―. Social sc...
WalkSafe : A Pedestrian
by phoebe-click
Safety App. Presented by,. Ramya . Deepa. Palle....
DYNAMIC CONTENT MANAGEMENT
by karlyn-bohler
THE PROBLEMS. WITH . MOST ECM SYSTEMS. ECM. ERP. ...
Making you aware CS577a 17Fall
by conchita-marotz
Team 04 . 1. . . :.:. . Outline. . Operational C...
Mobile Platform Security Models
by aaron
. John Mitchell. CS 155. Spring . 2014. Outl...
Load More...