NIELSEN SunSoft ROBERT L . MACK IBM

نویسندگان

  • Cathleen Wharton
  • john Rieman
  • Clayton Lewis
  • Peter Polson
چکیده

The cognitive walkthrough (Lewis et al. 1990; Polson et al. 1992a) is a usability inspection method that focuses on evaluating a design for ease of learning, particularly by exploration. This focus is motivated by the observation that many users prefer to learn software by exploration (Carroll and Rosson 1987; Fischer 199 1). Instead of investing time for comprehensive formal training when a s o h a r e package is first acquired, users prefer to learn about its functionality while they work at their usual tasks, acquiring knowledge of how to use new features only when their work actually requires them. This incremental approach to learning ensures that the cost of learning a new feature is in part determined by the feature's immediate benefit to the user.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Text analytics for life science using the Unstructured Information Management Architecture

Biomedical text plays a fundamental role in knowledge discovery in life science, in both basic research (in the field of bioinformatics) and in industry sectors devoted to improving medical practice, drug development, and health care (such as medical informatics, clinical genomics, and other sectors). Several groups in the IBM Research Division are collaborating on the development of a prototyp...

متن کامل

Principles for Optimizing CORBA Internet Inter-ORB Protocol Performance

The Internet Inter-ORB Protocol (IIOP) enables heterogeneous CORBA-compliant Object Request Brokers (ORBs) to interoperate over TCP/IP networks. IIOP uses the Common Data Representation (CDR) transfer syntax to map OMG Interface Definition Language (IDL) data types into a portable network format. Due to the excessive marshaling/demarshaling overhead, data copying, and high-levels of function ca...

متن کامل

IBM Research Activities at TREC

Several groups in IBM’s Research Division have participated in TREC, with differing goals. This chapter summarizes some of their activities and the conclusions they reached. It should be emphasized that there was no central plan in these activities – individual groups decided to participate in the way that made sense to them at the time. In effect, participation in TREC was a tool they used to ...

متن کامل

The IPS Cryptographic Programs

portance as computers have become faster and as strong cryptographic algorithms, such as the Data Encryption Standard (DES) , have become available. But a standard encipherment technique is only the j r s t step in applying cryptography in a computing center. This paper discusses the Information Protection System (IPS), a set of cryptographic application programs designed to use the DES algori...

متن کامل

Pediatric Crohn disease patients exhibit specific ileal transcriptome and microbiome signature

Yael Haberman, Timothy L. Tickle, Phillip J. Dexheimer, Mi-Ok Kim, Dora Tang, Rebekah Karns, Robert N. Baldassano, Joshua D. Noe, Joel Rosh, James Markowitz, Melvin B. Heyman, Anne M. Griffiths, Wallace V. Crandall, David R. Mack, Susan S. Baker, Curtis Huttenhower, David J. Keljo, Jeffrey S. Hyams, Subra Kugathasan, Thomas D. Walters, Bruce Aronow, Ramnik J. Xavier, Dirk Gevers, and Lee A. Denson

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005