Sciweavers

3555 search results - page 514 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
CHI
2007
ACM
16 years 4 months ago
Biases in human estimation of interruptibility: effects and implications for practice
People have developed a variety of conventions for negotiating face-to-face interruptions. The physical distribution of teams, however, together with the use of computer-mediated ...
Daniel Avrahami, James Fogarty, Scott E. Hudson
CHI
2004
ACM
16 years 4 months ago
Gooey interfaces: an approach for rapidly repurposing digital content
With the acceleration of technological development we are reaching the point where our systems and their user interfaces become to some degree outdated 'legacy systems' ...
Les Nelson, Elizabeth F. Churchill, Laurent Denoue...
HICSS
2006
IEEE
105views Biometrics» more  HICSS 2006»
15 years 10 months ago
Unified Information Models in Support of Location Transparency for Future Utility Applications
For future scenarios of power system operations, like the self healing grid vision, system and communications architecture are key. Applications will require unlimited access to a...
Otto Preiss, Tatjana Kostic
ISPW
2006
IEEE
15 years 10 months ago
Spiral Lifecycle Increment Modeling for New Hybrid Processes
The spiral lifecycle is being extended to address new challenges for Software-Intensive Systems of Systems (SISOS), such as coping with rapid change while simultaneously assuring h...
Raymond J. Madachy, Barry W. Boehm, Jo Ann Lane
NORDICHI
2004
ACM
15 years 9 months ago
Six modes of proactive resource management: a user-centric typology for proactive behaviors
Proactivity has recently arisen as one of the focus areas within HCI. Proactive systems adhere to two premises: 1) working on behalf of, or pro, the user, and 2) acting on their o...
Antti Salovaara, Antti Oulasvirta