Correlations between invisibility and usability in ubicomp and IoT applications: partial results
暂无分享,去创建一个
Káthia Marçal de Oliveira | Rossana M. de Castro Andrade | Rainara Maia Carvalho | K. Oliveira | Rossana Andrade | R. M. Carvalho
[1] Káthia Marçal de Oliveira,et al. Towards a catalog of conflicts for HCI quality characteristics in UbiComp and IoT applications: Process and first results , 2018, 2018 12th International Conference on Research Challenges in Information Science (RCIS).
[2] Káthia Marçal de Oliveira,et al. AQUArIUM - A suite of software measures for HCI quality evaluation of ubiquitous mobile applications , 2018, J. Syst. Softw..
[3] Juliet M. Corbin,et al. Basics of Qualitative Research (3rd ed.): Techniques and Procedures for Developing Grounded Theory , 2008 .
[4] Julio Cesar Sampaio do Prado Leite,et al. On Non-Functional Requirements in Software Engineering , 2009, Conceptual Modeling: Foundations and Applications.
[5] Ankit Agrawal,et al. All your Google and Facebook logins are belong to us: A case for single sign-off , 2015, 2015 Eighth International Conference on Contemporary Computing (IC3).
[6] Eric Yu,et al. Non-Functional Requirements Elicitation , 2019, International Journal of Recent Technology and Engineering.
[7] Anselm L. Strauss,et al. Basics of qualitative research : techniques and procedures for developing grounded theory , 1998 .
[8] Gian Luigi Ferrari,et al. Formalising Security in Ubiquitous and Cloud Scenarios , 2012, CISIM.
[9] Luiz Marcio Cysneiros,et al. Evaluating the Effectiveness of Using Catalogues to Elicit Non-Functional Requirements , 2007, WER.
[10] Káthia Marçal de Oliveira,et al. What Changes from Ubiquitous Computing to Internet of Things in Interaction Evaluation? , 2017, HCI.
[11] Jean Scholtz,et al. Toward a Framework for Evaluating Ubiquitous Computing Applications , 2004, IEEE Pervasive Comput..
[12] Amitava Mukherjee,et al. Pervasive Computing: A Paradigm for the 21st Century , 2003, Computer.
[13] Tuomas Aura,et al. Logout in single sign-on systems: Problems and solutions , 2014, J. Inf. Secur. Appl..
[14] Giancarlo Guizzardi,et al. A Method for Eliciting Goals for Business Process Models based on Non-Functional Requirements Catalogues , 2011, Int. J. Inf. Syst. Model. Des..
[15] Jean-Philippe Vasseur,et al. Interconnecting Smart Objects with IP: The Next Internet , 2010 .
[16] Kirstie Hawkey,et al. What makes users refuse web single sign-on?: an empirical investigation of OpenID , 2011, SOUPS.
[17] Alexander Egyed,et al. Identifying requirements conflicts and cooperation: how quality attributes and automated traceability can help , 2004, IEEE Software.
[18] Fanny Andalia,et al. Implementation of Analytical Hierarchy Process On Airplane Ticket Booking Application Selection With Software Quality Requirements and Evaluation ISO / IEC 25010 : 2011 , 2018 .
[19] Káthia Marçal de Oliveira,et al. Quality characteristics and measures for human–computer interaction evaluation in ubiquitous systems , 2017, Software Quality Journal.
[20] Rainara Maia Carvalho. Dealing with Conflicts Between Non-functional Requirements of UbiComp and IoT Applications , 2017, 2017 IEEE 25th International Requirements Engineering Conference (RE).
[21] Rossana M. de Castro Andrade,et al. Requirements and challenges for building service-oriented pervasive middleware , 2009, ICPS '09.
[22] Serge Egelman,et al. My profile is my password, verify me!: the privacy/convenience tradeoff of facebook connect , 2013, CHI.
[23] Maurício Serrano,et al. Ubiquitous, Pervasive and Mobile Computing: A Reusable-Models-based Non-Functional Catalogue , 2013, ER@BR.
[24] Didar Zowghi,et al. Constructing a Catalogue of Conflicts among Non-functional Requirements , 2010, ENASE.
[25] Christophe Kolski,et al. Catalog of Invisibility Requirements for UbiComp and IoT Applications , 2018, 2018 IEEE 26th International Requirements Engineering Conference (RE).