A question I hear pretty frequently is, “Why a redesign of the admin panel so soon after 2.5?” Those who have attended WordCamps in the past few months have already heard the answer, but for the people who haven’t had that opportunity, this post is for you.
When the community response to the 2.5 admin [...]
This page has been created to provide organisations and individuals using the OECD Privacy Statement Generator with information about international instruments and national regulations which apply to the ...
The User Interface Design group studies new user interface techniques, focusing on two areas:
* Usable automation. Our goal is for every computer user to be able to harness the power of automation for handling repetitive, time-wasting, or error-prone tasks, without having to struggle with the complexity of programming.
* Usable security. Effective security depends on good user interfaces. A door may have the strongest lock in the world, but if authorized users can't open and close it easily, and have to leave it open in order to get their jobs done, then it has no security at all. We are studying ways to rethink computer security so that it is not only secure against attack but also usable by ordinary people.
Two-way latent grouping model for user preference prediction
Eerika Savia, Kai Puolamäki, Janne Sinkkonen and Samuel Kaski
In: UAI 2005, 26-29 July 2005, Edinburgh, Scotland.
With all the skepticism of whether it's just a social media fad and questions about how the company expects to generate revenue, Twitter has left many critics silent by continuing to grow.
This document provides an in-depth look at the process used in trying to solve real issues with the User Experience of a social bookmarking application. While it might be easy to simply take the first solution that works and assume that it’s the best solution, the first solution is very rarely the best solution. We found several solutions to several problems, and many of them worked and appeared to be decent solutions. It was only upon further investigation and doing more detailed research that we found hidden flaws in some solutions, issues with user satisfaction in other solutions, and even found some solutions that broke entirely under certain conditions.
This paper will describe the problems we faced in detail and then provide an explanation of the solutions evaluated for each problem, including the benefits and drawbacks of each solution. We will also identify the final solution chosen and why it was chosen.
Hi! If you think I add value to your network, do drop me a recommendation at http://mrtweet.net/jomiralb?gr Much appreciated! [from http://twitter.com/jomiralb/statuses/1218488446]
Wir wollen mithelfen, dass die Welt von morgen ein kleines bisschen benutzbarer wird. Dazu legen wir auf UXcite unsere Erfahrungen aus dem Bereich User Experience dar und hoffen darauf jede Menge Gleichgesinnte zum Austausch zu finden.
So to map your files with user id 1001 in /mnt/wrong to /mnt/correct with user id 1234, run this command:
sudo bindfs --map=1001/1234 /mnt/wrong /mnt/correct
In order to remove potential obstacles to personal data flows and to ensure a high level of protection within the EU, data protection legislation has been harmonised. The Commission also engages in dialogues with non-EU countries.
M. Barz, M. Moniri, M. Weber, and D. Sonntag. Adjunct Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '16), Heidelberg, Germany, page 17--20. New York, ACM, (2016)
A. Batliner, C. Hacker, M. Kaiser, H. Mögele, and E. Nöth. Proceedings of AVSP'07: International Conference on Auditory-Visual Speech Processing, Kasteel Groenendaal, Hilvarenbeek, The Netherlands, (2007)
P. Gebhard, T. Schneeberger, T. Baur, and E. André. Proceedings of the Seventeenth International Conference on Autonomous Agents and Multiagent Systems (AAMAS '18), Stockholm, Sweden, page ?--?. New York, ACM, (2018)to appear.
A. Neto, T. Bittar, R. Fortes, and K. Felizardo. SAC '09: Proceedings of the 2009 ACM Symposium on Applied Computing, Honolulu, HI, USA, page 116-120. (2009)
S. Ghosh, N. Sharma, F. Benevenuto, N. Ganguly, and K. Gummadi. Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrieval, page 575--590. New York, NY, USA, ACM, (2012)
S. Blümling, and N. Reithinger. Proceedings of DeLFI Workshops 2015, co-located with 13th e-Learning Conference of the German Computer Society (DeLFI-15), Munich, Germany, volume 1443 of CEUR Workshop Proceedings, page 10--18. RWTH Aachen, Sun SITE Central Europe, (2015)
D. Quercia, M. Kosinski, D. Stillwell, and J. Crowcroft. Proceedings of the Third International Conference on Social Computing (SocialCom) and the Third International Conference on Privacy, Security, Risk and Trust (PASSAT), page 180--185. IEEE, (October 2011)
M. Fisichella, J. De Coi, R. Kawase, and M. Matera. Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics, page 33:1--33:10. New York, NY, USA, ACM, (2012)