Sciweavers

17018 search results - page 21 / 3404
» From the How to the What
Sort
View
90
Voted
CORR
2008
Springer
152views Education» more  CORR 2008»
15 years 14 days ago
It's Not What You Have, But How You Use It: Compromises in Mobile Device Use
As users begin to use many more devices for personal information management (PIM) than just the traditional desktop computer, it is essential for HCI researchers to understand how...
Manas Tungare, Manuel A. Pérez-Quiño...
FDL
2007
IEEE
15 years 4 months ago
Transaction Level Modelling: A reflection on what TLM is and how TLMs may be classified
Transaction-level modelling (TLM) is a poorlyterm, promising a level of abstraction like RTL (register transfer level), where the key feature is a `transaction'. But unlike r...
Mark Burton, James Aldis, Robert Günzel, Wolf...
DCC
2007
IEEE
15 years 12 months ago
What is a design? How should we classify them?
R. A. Bailey, Peter J. Cameron
84
Voted
CHI
2010
ACM
15 years 7 months ago
Computing technology in international development: who, what, where, when, why and how?
BuildingonthesuccessesofpriorworkshopsatCHI andotherHCIconferencesoncomputingin internationaldevelopment,weproposeapanelto engagewiththebroaderCHIcommunity.Topicstobe discussedinc...
Matthew Kam, Susan M. Dray, Kentaro Toyama, Gary M...
82
Voted
ICICS
2009
Springer
15 years 7 months ago
How to Steal a Botnet and What Can Happen When You Do
Richard A. Kemmerer