Sciweavers

1949 search results - page 161 / 390
» Protective Interface Specifications
Sort
View
DSVIS
2006
Springer
15 years 5 months ago
Interaction Walkthrough: Evaluation of Safety Critical Interactive Systems
Usability evaluation methods are a battery of techniques for assessing the usability of interactive systems or of proposed interactive systems. This paper describes a new evaluatio...
Harold W. Thimbleby
ECBS
2005
IEEE
108views Hardware» more  ECBS 2005»
15 years 3 months ago
Interceptor Based Constraint Violation Detection
Monitoring critical events such as constraints violations is one of the key issues of Autonomic Systems. This paper presents an interceptor based approach of constraint violation ...
Qianxiang Wang, Aditya P. Mathur
IUSED
2008
15 years 3 months ago
Fostering Remote User Participation and Integration of User Feedback into Software Development
Permanent involvement of end users in software development is both highly recommended and highly challenging. Against the background of our results and experiences from two resear...
Steffen Lohmann, Asarnusch Rashid
104
Voted
MIE
2008
138views Healthcare» more  MIE 2008»
15 years 3 months ago
The Contextual Nature of Usability and its Relevance to Medical Informatics
We report from three usability evaluations of health information systems that illustrate the value of seeing usability as a context dependent property of a product. We show how the...
Dag Svanæs, Anita Das, Ole Andreas Alsos
CATS
2006
15 years 3 months ago
Formalising the L4 microkernel API
This paper gives an overview of a pilot project on the specification and verification of the L4 highperformance microkernel. Of the three aspects examined in the project, we descr...
Rafal Kolanski, Gerwin Klein