Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Users'
Users published presentations and documents on DocSlides.
An Operating System for the Home
by liane-varnes
Colin Dixon (IBM Research) . Ratul. . Mahajan....
EE360: Lecture
by olivia-moreira
13 . Outline. Cognitive Radios and their Capacity...
1 Lecture 9:
by giovanna-bartolotta
Evaluation Using. Heuristic Analysis. Brad Myers....
Application of Mobile technology in Library
by debby-jeon
services. Dr. B.T. . Sampath. Kumar. Associate P...
Cellular Networks
by faustina-dinatale
CPSC441, Winter 2010. First Mobile Telephone Syst...
Operating Systems:
by karlyn-bohler
Principles and Practice. Tom Anderson. How This C...
Social Media Marketing
by min-jolicoeur
OPPORTUNITIES . Who is 77Agency?. 100 Employees. ...
Indiana’s Prescription Monitoring Program
by sherrill-nordquist
What is INSPECT? . INSPECT is 1 . of 34 operatio...
Avatars, Identity & Deception
by debby-jeon
A.R. Stone “In Novel . Condtions. ”. Julian ....
Introduction to Design
by kittie-lecroy
Patterns in interaction and graphics. Agenda. Com...
Socially-Adaptable Interfaces:
by trish-goza
Crowdsourcing Customizations. Michael Bass. http:...
Social Media
by tatyana-admore
Apps . Kids Should Avoid and Parents need to know...
IMPLICATIONS FOR UNIVERSITY POLICY
by lois-ondreau
BL, JISC & MLA BRIEFING, 29/6/2010. Professo...
Security and Authorization
by jane-oiler
Chapter 21. Introduction to DB Security. Secrecy:...
Usability Evaluation with Users
by karlyn-bohler
CMPT 281. Outline. Usability review. Observationa...
You Are How You Click
by briana-ranney
Clickstream Analysis for . Sybil. D. etection. G...
Nick Berry
by lois-ondreau
All logos and trademarks in this presentation are...
EMERGING TRENDS, TECHNOLOGIES, AND APPLICATIONS
by faustina-dinatale
CHAPTER 14. Hossein BIDGOLI. MIS. . GOOGLE. Appl...
GUI Bloopers
by tatyana-admore
Basic Principles. What is a GUI Blooper?. “Bloo...
GUI Bloopers
by calandra-battersby
Navigation . and Text Bloopers. Navigation. The m...
About the app
by marina-yarberry
Buddypass. is a social networking app designed t...
Institut français
by olivia-moreira
des sciences et technologies. des transports, de ...
Is Voice-Based Bubbly the New Twitter?
by tawny-fly
By . Rupal. . Perekh. Presented by Kelsey Chan a...
BUDGET UPDATE DOCUMENT
by liane-varnes
(BUD). Overview. Purpose of the Budget Update Doc...
CASE STUDY
by karlyn-bohler
CAREFREE Image Campaign. measuring its online adv...
Cloud Usability Framework
by alexa-scheidler
Brian Stanton (NIST). Mary . Theofanos. (NIST. )...
Cocaine
by tatiana-dople
And its consequences. By, Aaron Pritchard . And. ...
Robot
by liane-varnes
companions. and . ethics. a . pragmatical. . ap...
A site administrator can access their result summaries via
by tawny-fly
Results. toolbar button by clicking the . Summar...
Pania
by trish-goza
Thong. Venkat. . Rao. Jon McCord. REAL-LIFE ACH...
BANGALORE
by test
Accelerate with BIRT and Actuate 11. Successfully...
Ch. 22
by kittie-lecroy
Bring Glencoe Health Book and Workbook to class t...
SCCM 2012 R2
by min-jolicoeur
Empower your users. Gregory . Bouchu. & Lion...
COMMUNITY
by phoebe-click
BASED EDUCATION PROGRAM ON ILL EFFECTS OF SUBSTAN...
Effects of
by debby-jeon
Community size and contact rate . on synchronous ...
Strange Bedfellows: The
by tatyana-admore
Conflicting (and. Conflicted) Relationship. Betwe...
Service Provisioning for Wireless Mesh Networks
by briana-ranney
Eric Koskie. Overview. What services are commonly...
Nick Berry
by danika-pritchard
Demographic analysis of . FaceBook. users. All l...
Bullying on social Networks
by ellena-manuel
By James, Brad . and Josh . Overview. . Social N...
Cluster Platforms
by pasty-toler
Integration Possibilities. Rainer Sträter. Danie...
Load More...