NIELSEN SunSoft ROBERT L . MACK IBM
نویسندگان
چکیده
The cognitive walkthrough (Lewis et al. 1990; Polson et al. 1992a) is a usability inspection method that focuses on evaluating a design for ease of learning, particularly by exploration. This focus is motivated by the observation that many users prefer to learn software by exploration (Carroll and Rosson 1987; Fischer 199 1). Instead of investing time for comprehensive formal training when a s o h a r e package is first acquired, users prefer to learn about its functionality while they work at their usual tasks, acquiring knowledge of how to use new features only when their work actually requires them. This incremental approach to learning ensures that the cost of learning a new feature is in part determined by the feature's immediate benefit to the user.
منابع مشابه
Text analytics for life science using the Unstructured Information Management Architecture
Biomedical text plays a fundamental role in knowledge discovery in life science, in both basic research (in the field of bioinformatics) and in industry sectors devoted to improving medical practice, drug development, and health care (such as medical informatics, clinical genomics, and other sectors). Several groups in the IBM Research Division are collaborating on the development of a prototyp...
متن کاملPrinciples for Optimizing CORBA Internet Inter-ORB Protocol Performance
The Internet Inter-ORB Protocol (IIOP) enables heterogeneous CORBA-compliant Object Request Brokers (ORBs) to interoperate over TCP/IP networks. IIOP uses the Common Data Representation (CDR) transfer syntax to map OMG Interface Definition Language (IDL) data types into a portable network format. Due to the excessive marshaling/demarshaling overhead, data copying, and high-levels of function ca...
متن کاملIBM Research Activities at TREC
Several groups in IBM’s Research Division have participated in TREC, with differing goals. This chapter summarizes some of their activities and the conclusions they reached. It should be emphasized that there was no central plan in these activities – individual groups decided to participate in the way that made sense to them at the time. In effect, participation in TREC was a tool they used to ...
متن کاملThe IPS Cryptographic Programs
portance as computers have become faster and as strong cryptographic algorithms, such as the Data Encryption Standard (DES) , have become available. But a standard encipherment technique is only the j r s t step in applying cryptography in a computing center. This paper discusses the Information Protection System (IPS), a set of cryptographic application programs designed to use the DES algori...
متن کاملPediatric Crohn disease patients exhibit specific ileal transcriptome and microbiome signature
Yael Haberman, Timothy L. Tickle, Phillip J. Dexheimer, Mi-Ok Kim, Dora Tang, Rebekah Karns, Robert N. Baldassano, Joshua D. Noe, Joel Rosh, James Markowitz, Melvin B. Heyman, Anne M. Griffiths, Wallace V. Crandall, David R. Mack, Susan S. Baker, Curtis Huttenhower, David J. Keljo, Jeffrey S. Hyams, Subra Kugathasan, Thomas D. Walters, Bruce Aronow, Ramnik J. Xavier, Dirk Gevers, and Lee A. Denson
متن کامل