Sciweavers

694 search results - page 96 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
CHI
2001
ACM
16 years 5 days ago
What makes Web sites credible?: a report on a large quantitative study
The credibility of web sites is becoming an increasingly important area to understand. To expand knowledge in this domain, we conducted an online study that investigated how diffe...
B. J. Fogg, Jonathan Marshall, Othman Laraki, Alex...
ICSE
2005
IEEE-ACM
15 years 12 months ago
Helping users avoid bugs in GUI applications
In this paper, we propose a method to help users avoid bugs in GUI applications. In particular, users would use the application normally and report bugs that they encounter to pre...
Amir Michail, Tao Xie
GLOBECOM
2009
IEEE
15 years 6 months ago
QOMB: A Wireless Network Emulation Testbed
—In this paper we present QOMB, a testbed we designed and implemented for the evaluation of wireless network systems, protocols and applications. The testbed uses the wireless ne...
Razvan Beuran, Lan Tien Nguyen, Toshiyuki Miyachi,...
SCIA
2007
Springer
154views Image Analysis» more  SCIA 2007»
15 years 6 months ago
3D Deformable Registration for Monitoring Radiotherapy Treatment in Prostate Cancer
Two deformable registration methods, the Demons and the Morphon algorithms, have been used for registration of CT datasets to evaluate their usability in radiotherapy planning for ...
Borja Rodríguez-Vila, Johanna Pettersson, M...
CBSE
2005
Springer
15 years 5 months ago
Finding a Needle in the Haystack: A Technique for Ranking Matches Between Components
Abstract. Searching and subsequently selecting reusable components from component repositories has become a key impediment for not only component-based development but also for ach...
Naiyana Tansalarak, Kajal T. Claypool