Experiences with the Evaluation of Cve Applications

نویسندگان

  • ANTHONY STEED
  • JOLANDA TROMP
چکیده

We present our experience with a usability evaluation of two prototype CVE applications being developed by the COVEN project. The applications are a teleconferencing system aimed at future business users of CVEs, and a holiday planning environment for the use of the general public. Our concerns in the evaluations were three fold: to refine the design of these applications, to gain further understanding of the component technologies of CVEs, and to reflect upon methodologies for evaluation. We report upon two main threads of investigation: a usability inspection of the applications, and a series of network trials. We discuss some important outstanding issues for the system designer, and suggest several guidelines for the application builder. Finally we reflect upon the methodologies chosen and suggest a focus for future CVE evaluations.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

COllaborative Virtual ENvironments: Experiments on Small Group Behaviour in the COVEN Project

This paper describes work being undertaken by the multi-partner European Union funded project COVEN (COllaborative Virtual ENvironments). COVEN is developing collaborative virtual environment (CVE) systems and technologies in order to support a group of travel rehearsal applications. One of the major themes of the project is the evaluation of CVE applications through extensive network trials, u...

متن کامل

An Alternative Design of Collaborative Virtual Environment Architecture Based on Cloud Computing

Collaborative Virtual Environment (CVE) systems allow the sharing of virtual space, and each participant is represented by an entity in the CVE. Resources are consumed when interaction among several users occurs. The resources are consumed as a result of updating its own state, and the communication resources required to distribute the update of counterpart users in the CVE. The Peer-to-Peer (p...

متن کامل

Evaluation Framework for 3D Collaborative Virtual Environments (the Core)

As a consequence of the increasing interest in Collaborative Virtual Environments (CVEs) and the complex nature of such systems, the need for a thorough evaluation framework has become necessary. The current evaluation frameworks suffer from limitations in assessment because they are either confined to evaluation of a specific type of CVE or they focus on a restricted aspect of CVE. This paper ...

متن کامل

Experiences of elementary male students from descriptive evaluation

This study conducted with aim of investigation profound experiences of elementary male students in the fourth and fifth grades from the descriptive evaluation. The method of this study was qualitative and phenomenological one. To achieve this objective and considering the nature of the study, purposeful sampling was used. Collected Data were saturated by interviewing with nine students. Data we...

متن کامل

System - Vulnerabilities #1 - Acos 3.x, 4.x

Item # Vulnerability ID Score Source Score Summary 1 CVE-2015-2059 CVSS 2.0 7.5 High libidn: out-of-bounds read with stringprep on invalid UTF-8. [1] 2 CVE-2011-1425 CVSS 2.0 7.5 High xmlsec1: arbitrary file creation when verifying signatures [2] 3 CVE-2015-7696 CVSS 3.0 6.8 Med unzip: Heap overflow and DoS in 6.0 [3] 4 CVE-2014-9471 CVSS 2.0 7.5 High coreutils: memory corruption flaw in parse_...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998