Search

Your search keyword '"Computer users"' showing total 1,409 results

Search Constraints

Start Over You searched for: Descriptor "Computer users" Remove constraint Descriptor: "Computer users" Topic computer software Remove constraint Topic: computer software
1,409 results on '"Computer users"'

Search Results

1. Chaos and stability of a fractional model of the cyber ecosystem.

2. Train to Sustain.

3. RESEARCH AND APPLICATION OF THERMAL ENERGY RECOVERY AND AUTOMATIC MONITORING SYSTEM FOR MOTOR EQUIPMENT.

4. Measuring Security Practices.

5. Calculating Couples: Computing Intimacy and 1980s Romance Software.

6. Human-artificial intelligence approaches for secure analysis in CAPTCHA codes.

7. Spiele, Tools & Co.: Die besten Live-Systeme.

8. EKRAN ÇÖZÜNÜRLÜĞÜNE DUYARLI BİR AKILLI ARAYÜZ YERLEŞTİRME YAKLAŞIMI.

9. INTERACTING WITH 3D MODELS – 3D-CAD VS. HOLOGRAPHIC MODELS.

10. Investigation of the effectiveness of common representational formats in online learner-paced software training materials.

11. Voice Recognition Technology: Has It Come of Age?

12. CAN'T HELP LOVING THAT MAC OF MINE.

13. Identification of clinically related requirements of a novel assistive device for people with a high spinal cord injury.

14. Choice Models for the Evaluation and Selection of Software Packages.

15. Facilitating Group Creativity: Experience with a Group Decision Support System.

16. Examining User Involvement in Continuous Software Development (A case of error reporting system).

17. POLARIS: VIRUS-SAFE COMPUTING for Windows XP.

18. EXTERNALLY VERIFIABLE CODE EXECUTION.

19. A Framework for Spyware Assessment.

20. What Do Consumers Really Know About Spyware?

21. SPYWARE: A Little Knowledge is a Wonderful Thing.

22. Mathematics as a Language or, Conversation with a Computor.

23. ALIGNING INTERNET USAGE WITH BUSINESS PRIORITIES.

24. MAGNETO-OPTICAL DATA STORAGE.

25. Capturing HUMAN INTELLIGENCE in the Net.

26. Cross Platform Usability: Evaluating Computing Tasks Performed on Multiple Platforms.

27. O Uso de Microtasks no Desenvolvimento de Software Crowdsourcing.

28. Web-based scientific computing, a little explored field:An Engineering problem:pneumatic transport.

29. Biometrics: Accessibility challenge or opportunity?

30. Does Licensing Require New Access Control Techniques?

31. Bottom-Up Design of Software Agents.

32. Support for Collaborative Design: Agents and Emergence.

33. Graphs and Tables: A Four-Factor Experiment.

34. Academic Careers for Experimental Computer Scientists and Engineers.

35. INTERFACE AN EVOLVING CONCEPT.

36. president's Letter. A Hygiene Lesson.

37. COMPARING TWO MICROCOMPUTER OPERATING SYSTEMS: CP/M AND HDOS.

38. Legal & security issues posed by computer utilities.

39. Assistive Video or Assistive Courseware: What Hearingimpaired Learners Say?

40. Parallel phishing attack recognition using software agents.

41. Data leakage detection algorithm based on task sequences and probabilities.

42. A Petri-Net-Based Virtual Deployment Testing Environment for Enterprise Software Systems.

43. Generating Cyclic-Random Sequences in a Constrained Space for In-System Validation.

44. Can we Take User Responses at Face Value? Exploring Users' "Self-stated" and "Derived" Importance of Utilitarian versus Hedonic Software Features.

45. Designing and Testing HealthTracker for Activity Recognition and Energy Expenditure Estimation within the DAPHNE Platform.

46. Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall.

47. How to check your PC’s CPU temperature.

48. MY AIM IS TO CLOSE THE GAP BETWEEN THE COMMUNITIES OF COMPUTER PROFESSIONALS AND COMPUTER HACKING.

49. Rethinking Remote Rendering: External GPUs, virtual machines and remote workstations broaden visualization options.

50. Spyware was Inevitable.

Catalog

Books, media, physical & digital resources