Sciweavers

903 search results - page 57 / 181
» Usability inspection methods
Sort
View
MCETECH
2009
Springer
15 years 4 months ago
TwoStep: An Authentication Method Combining Text and Graphical Passwords
Text-based passwords alone are subject to dictionary attacks as users tend to choose weak passwords in favor of memorability, as well as phishing attacks. Many recognition-based gr...
Paul C. van Oorschot, Tao Wan
74
Voted
ETRA
2000
ACM
59views Biometrics» more  ETRA 2000»
15 years 2 months ago
Text input methods for eye trackers using off-screen targets
Text input with eye trackers can be implemented in many ways such as on-screen keyboards or context sensitive menu-selection techniques. We propose the use of off-screen targets a...
Poika Isokoski
USAB
2007
14 years 11 months ago
User-Centered Methods Are Insufficient for Safety Critical Systems
The traditional approaches of HCI are essential, but they are unable to cope with the complexity of typical modern interactive devices in the safety critical context of medical dev...
Harold W. Thimbleby
EWSA
2006
Springer
15 years 1 months ago
Preserving Software Quality Characteristics from Requirements Analysis to Architectural Design
In this paper, we present a pattern-based software development method that preserves usability and security quality characteristics using a role-driven mapping of requirements anal...
Holger Schmidt, Ina Wentzlaff
SIMVIS
2008
14 years 11 months ago
Near-Wall Flow Visualization in Flattened Surface Neighborhoods
We present a method that flattens a curved surface and its neighborhood to create effective, uncluttered visualizations by applying standard flow visualization techniques in the d...
Christoph Petz, Steffen Prohaska, Leonid Goubergri...