作者: Presbyopia 時(shí)間: 2025-3-21 20:54 作者: labile 時(shí)間: 2025-3-22 03:58
The ‘‘a(chǎn)ftermath’’ of Industry 4.0 in Small and Medium Enterprisess facing a new revolution known as Industry 4.0. This new path al-lowed all enterprises to further develop their methodologies and understand the disadvantages and advantages of it. With the sole purpose of retaining costs in production while maintaining the same degree of quality, companies desire 作者: 肌肉 時(shí)間: 2025-3-22 08:22
User Persona of Mother of Preterm Neonatere hospitalization in Neonatal Intensive Care Units (NICUs), leading to mental stress for mothers and their families. The main objective of mother’s persona is to understand the mother behavior and preferences for designing app for these mothers. The mother’s persona is proposed based on hypothesis,作者: Compatriot 時(shí)間: 2025-3-22 11:25
Livability- Analysis of People’s Living Comfort in Different Cities of India Using GIS: A Prototypey comfort for modern livability standards. To analyze city livability, in this position paper we have proposed a system that provides a lifestyle overview through locality Indexing of a particular geographical area according to the ease of living for four particular age groups like a child, middle-a作者: 山間窄路 時(shí)間: 2025-3-22 16:10 作者: LUDE 時(shí)間: 2025-3-22 18:35 作者: Instinctive 時(shí)間: 2025-3-23 00:25
Assessing the Performance of Agile Teams is often based on the estimated total cost of the project in an official request for proposals. In this paper we describe an alternative approach where three performance factors and the estimated cost were assessed and weighted to find the best agile team for a particular project. Five agile softwa作者: 服從 時(shí)間: 2025-3-23 03:42 作者: 災(zāi)難 時(shí)間: 2025-3-23 08:58
Designing an Intelligent User Interface for Preventing Phishing Attacksade them difficult for humans and various anti-phishing techniques to detect. Also, the attacker community has proved itself able to quickly adapt to anti-phishing measures, mainly warning messages to help limit the effectiveness of phishing attacks and protect unsuspecting users. Despite the notabl作者: 愛(ài)花花兒憤怒 時(shí)間: 2025-3-23 13:29
On the Development of Context-Aware Augmented Reality Applicationsthe spread of AR applications in various domains (e.g. product design, manufacturing or maintenance) and the introduction of concepts such as Pervasive Augmented Reality (PAR), the aspect . started to play an important role. By sensing the user’s current context and adapting the AR application accor作者: Canyon 時(shí)間: 2025-3-23 17:10
Towards Identification of Patterns Aligning Security and Usabilitying the right trade-offs between security and usability is often not an easy task. Engineering of such trade-offs is mainly reliant on developers’ skills, who are either experts in security or usability. This research aims to assist the developers in engineering the right trade-offs by proposing the作者: 高深莫測(cè) 時(shí)間: 2025-3-23 21:04 作者: comely 時(shí)間: 2025-3-23 22:27 作者: 結(jié)果 時(shí)間: 2025-3-24 05:43
Marketing Research in the Global Environments facing a new revolution known as Industry 4.0. This new path al-lowed all enterprises to further develop their methodologies and understand the disadvantages and advantages of it. With the sole purpose of retaining costs in production while maintaining the same degree of quality, companies desire 作者: 不易燃 時(shí)間: 2025-3-24 07:02 作者: 悲痛 時(shí)間: 2025-3-24 13:58 作者: 壓倒 時(shí)間: 2025-3-24 18:52
International Marketing Research Procession with assistive technologies such as collaborative robots. The video-based learning format is based on design thinking and helps shop floor workers create and document solutions to robot interaction problems, and share their how-to knowledge with their colleagues. Early field evaluation results i作者: 不朽中國(guó) 時(shí)間: 2025-3-24 21:49 作者: Breach 時(shí)間: 2025-3-24 23:33
Marketing Research in the Global Environment is often based on the estimated total cost of the project in an official request for proposals. In this paper we describe an alternative approach where three performance factors and the estimated cost were assessed and weighted to find the best agile team for a particular project. Five agile softwa作者: 摻和 時(shí)間: 2025-3-25 03:43 作者: Jargon 時(shí)間: 2025-3-25 10:34
Preliminary Stages of the Research Processade them difficult for humans and various anti-phishing techniques to detect. Also, the attacker community has proved itself able to quickly adapt to anti-phishing measures, mainly warning messages to help limit the effectiveness of phishing attacks and protect unsuspecting users. Despite the notabl作者: 魔鬼在游行 時(shí)間: 2025-3-25 12:50 作者: DOLT 時(shí)間: 2025-3-25 18:39
International Marketing Researching the right trade-offs between security and usability is often not an easy task. Engineering of such trade-offs is mainly reliant on developers’ skills, who are either experts in security or usability. This research aims to assist the developers in engineering the right trade-offs by proposing the作者: drusen 時(shí)間: 2025-3-25 22:22
Beyond Interactions978-3-030-46540-7Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: instulate 時(shí)間: 2025-3-26 02:25 作者: 潛移默化 時(shí)間: 2025-3-26 04:48 作者: 變化無(wú)常 時(shí)間: 2025-3-26 09:33 作者: 規(guī)范要多 時(shí)間: 2025-3-26 13:51
José Abdelnour Nocera,Antigoni Parmaxi,Peter Danne作者: Torrid 時(shí)間: 2025-3-26 17:30 作者: Coronation 時(shí)間: 2025-3-26 22:54 作者: 紡織品 時(shí)間: 2025-3-27 02:24
Assessing the Performance of Agile Teamshe three performance factors during and after the workshops and the results of the assessments. The team that focused on one user story during the workshop and emphasized the three different quality factors, user experience, accessibility and security, got the highest rating from the assessment and 作者: 食料 時(shí)間: 2025-3-27 06:17 作者: exceed 時(shí)間: 2025-3-27 12:05
Preliminary Stages of the Research Processn end result. Parallel computations consisting of pattern discovery (by mining algorithms) and data aggregation are carried on a cloud service maintaining a local data store for processed queries. The generated end result is then presented to the user in the form of visualization charts.作者: BOOST 時(shí)間: 2025-3-27 15:33 作者: 為敵 時(shí)間: 2025-3-27 21:21 作者: BLAZE 時(shí)間: 2025-3-28 01:00
International Marketing Research Processss and analysis can be used during systems design or integration. We also present several examples of .-. properties and demonstrate their importance and use on a simple example of aircraft cockpits buttons.作者: 純樸 時(shí)間: 2025-3-28 03:56 作者: BARGE 時(shí)間: 2025-3-28 07:41
Conference proceedings 2020lopment Processes...The 12 papers included in this volume were carefully reviewed and selected from numerous submissions. They show advances in the field of HCI dealing with topics such as wearables, user experience and wellbeing at work, security, usability, user experience and reliability in user-centered development processes..作者: 腐爛 時(shí)間: 2025-3-28 13:48
0302-9743 Interaction, INTERACT 2019, which was held in September 2019 in Paphos, Cyprus. The workshops are: ..- Beyond Computers: Wearables, Humans, And Things - WHAT!..- User Experiences and Wellbeing at Work (UX@Work) ..- Workshop on Handling Security, Usability, User Experience and Reliability in User-Cen作者: 符合國(guó)情 時(shí)間: 2025-3-28 15:20 作者: 貞潔 時(shí)間: 2025-3-28 21:24
Wellbeing at Work: Four Perspectives on What User Experiences with Artifacts May Contributes foster positive UX when they lend the user expressive power (tool), are transparent (media) or perceptive (dialogue partner).They foster negative UX when they break the user’s task focus or make the user a mere system component. These findings are discussed and refined by elaborating the classic concepts of ready to hand and present at hand.作者: DAMP 時(shí)間: 2025-3-28 23:43
Conference proceedings 2020n, INTERACT 2019, which was held in September 2019 in Paphos, Cyprus. The workshops are: ..- Beyond Computers: Wearables, Humans, And Things - WHAT!..- User Experiences and Wellbeing at Work (UX@Work) ..- Workshop on Handling Security, Usability, User Experience and Reliability in User-Centered Deve作者: 哺乳動(dòng)物 時(shí)間: 2025-3-29 04:00
Marketing Research in the Global Environmentompanies manage to enter this exclusive circle, since such technologies also deliver a high cost which some companies simply cannot support. Consequently, this generates a huge drawback to the outsiders of this revolution.作者: 詞根詞綴法 時(shí)間: 2025-3-29 08:35
International Marketing Research Process Peer-tutoring learning format was also found useful by the company management and ownership as means of documentation and customer communication. Thus, the learning format can also support SMEs on their path to digitalization.作者: 過(guò)分自信 時(shí)間: 2025-3-29 14:40
Preliminary Stages of the Research Process an intelligent warning message mechanism, that might limit the effectiveness of phishing attacks and that might increase the user awareness about related risks. It implements an intelligent behavior that, besides warning the users that a phishing attack is occurring, explains why the specific suspect site can be fraudulent.作者: 平靜生活 時(shí)間: 2025-3-29 17:41
International Marketing Research security and usability developers by influencing their decision-making abilities when dealing with conflicts in other but similar context of use. For the identification of such patterns, the paper presents a three-stage methodology. To instantiate the methodology, a case study was conducted whose results are also presented in the paper.作者: BRUNT 時(shí)間: 2025-3-29 23:25 作者: Paradox 時(shí)間: 2025-3-30 03:19 作者: Aphorism 時(shí)間: 2025-3-30 04:44
Designing an Intelligent User Interface for Preventing Phishing Attacks an intelligent warning message mechanism, that might limit the effectiveness of phishing attacks and that might increase the user awareness about related risks. It implements an intelligent behavior that, besides warning the users that a phishing attack is occurring, explains why the specific suspect site can be fraudulent.作者: 自愛(ài) 時(shí)間: 2025-3-30 11:20