Recent years have seen an increasing use of sophisticated interaction techniques including in the field of safety critical interactive software [8]. The use of such techniques has been required in order to increase the bandwidth between the users and systems and thus to help them deal efficiently with increasingly complex systems. These techniques come from research and innovation done in the field of humancomputer interaction (HCI). A significant effort is currently being undertaken by the HCI community in order to apply and extend current usability evaluation techniques to these new kinds of interaction techniques. However, very little has been done to improve the reliability of software offering these kinds of interaction techniques. Eve...
Abstract-- The usability evaluation of the software interfaces is one of the prominent concepts in H...
The current variety of alternative approaches to usability evaluation methods (UEMs) designed to ass...
Network security ensures that essential and accessible network assets are protected from viruses, ke...
International audienceRecent years have seen an increasing use of sophisticated interaction techniqu...
This paper introduces a novel augmentation to the current heuristic usability evaluation methodology...
An ongoing issue within human-computer interaction (HCI) is the need for simplified or “discount” me...
Methods to assess and ensure system usability are becoming increasingly important as market edge bec...
This is a preprint of a paper intended for publication in a journal or proceedings. Since changes ma...
International audienceWhile a significant effort is currently being undertaken by the CHI community ...
Methods to assess and ensure system usability are be-coming increasingly important as market edge be...
Because there are various measures for comparing methods, researchers in human-computer interaction ...
Background: The success of clinical information systems depends upon their effective integration int...
This article is concerned with the human factors of software usability, namely: to what extent does ...
Traditional definitions of usability localise this fundamental Human Computer Interaction (HCI) conc...
This paper presents a usage analysis and taxonomy of methods which are used to evaluate the usabilit...
Abstract-- The usability evaluation of the software interfaces is one of the prominent concepts in H...
The current variety of alternative approaches to usability evaluation methods (UEMs) designed to ass...
Network security ensures that essential and accessible network assets are protected from viruses, ke...
International audienceRecent years have seen an increasing use of sophisticated interaction techniqu...
This paper introduces a novel augmentation to the current heuristic usability evaluation methodology...
An ongoing issue within human-computer interaction (HCI) is the need for simplified or “discount” me...
Methods to assess and ensure system usability are becoming increasingly important as market edge bec...
This is a preprint of a paper intended for publication in a journal or proceedings. Since changes ma...
International audienceWhile a significant effort is currently being undertaken by the CHI community ...
Methods to assess and ensure system usability are be-coming increasingly important as market edge be...
Because there are various measures for comparing methods, researchers in human-computer interaction ...
Background: The success of clinical information systems depends upon their effective integration int...
This article is concerned with the human factors of software usability, namely: to what extent does ...
Traditional definitions of usability localise this fundamental Human Computer Interaction (HCI) conc...
This paper presents a usage analysis and taxonomy of methods which are used to evaluate the usabilit...
Abstract-- The usability evaluation of the software interfaces is one of the prominent concepts in H...
The current variety of alternative approaches to usability evaluation methods (UEMs) designed to ass...
Network security ensures that essential and accessible network assets are protected from viruses, ke...