A Closer Look at User Centered Design

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Closer Look at Preduction

In a recent paper Jun Arima formalises the idea of preduc-tion { a non-monotonic schema providing a common basis for inductive and analogical reasoning. We examine some of the implications of this schema, as well as its connections with prototypes and conceptual spaces. A generalised version of his schema is motivated and developed to address diiculties with asymmetry and disjuncts.

متن کامل

A Closer Look at HMAC

Bellare, Canetti and Krawczyk [BCK96] show that cascading an ε-secure (fixed input length) PRF gives an O(εnq)-secure (variable input length) PRF when making at most q prefix-free queries of length n blocks. We observe that this translates to the same bound for NMAC (which is the cascade without the prefix-free requirement but an additional application of the PRF at the end), and give a matchin...

متن کامل

A Closer Look at Trumping1

According to Schaffer (2000a), “trumping preemption” is a category of redundant causation distinct from early and late preemption and from overdetermination. I show that the putative causal difference between causal processes in cases thought to be trumping preemption generates early preemption or overdetermination rather than trumping. I draw a novel lesson from cases thought to be trumping: t...

متن کامل

A Closer Look at Footers in Website Design

While the importance of website usability is rather well established in the literature, until recently few website designers have looked to the footer as a way to promote usability. That notion appears to be changing as more websites seem to be moving from a traditional (perfunctory) footer to one that is designed to deliver real value to the user experience. To date there has been little resea...

متن کامل

A Closer Look at Security in Random Number Generators Design

The issue of random number generation is crucial for the implementation of cryptographic systems. Random numbers are often used in key generation processes, authentication protocols, zeroknowledge protocols, padding, in many digital signature and encryption schemes, and even in some side channel attack countermeasures. For these applications, security depends to a great extent on the quality of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information Technology and Libraries

سال: 2018

ISSN: 2163-5226,0730-9295

DOI: 10.6017/ital.v37i2.10407