37,188 research outputs found
Towards an Experimental Framework for Measuring Usability of Model-Driven Tools 1
Abstract. According to the Model-Driven Development (MDD) paradigm, analysts can substantially improve the software development process concentrating their efforts on a conceptual model, which can be transformed into code by means of transformation rules applied by a model compiler. However, MDD tools are not widely used in industry. One of the reasons for this poor adoption is the lack of usability of MDD tools. This paper presents a framework to evaluate the usability of such tools. The framework will be used as a basis for a family of experiments to get clear insights into the barriers to usability that prevent MDD tools from being widely adopted in industry
Towards a kansei-based user modeling methodology for eco-design
We propose here to highlight the benefits of building a framework linking Kansei Design (KD), User Centered Design (UCD) and Eco-design, as the correlation between these fields is barely explored in research at the current time. Therefore, we believe Kansei Design could serve the goal of achieving more sustainable products by setting up an accurate understanding of the user in terms of ecological awareness, and consequently enhancing performance in the Eco-design process. In the same way, we will consider the means-end chain approach inspired from marketing research, as it is useful for identifying ecological values, mapping associated functions and defining suitable design solutions. Information gathered will serve as entry data for conducting scenario-based design, and supporting the development of an Eco-friendly User Centered Design methodology (EcoUCD).ANR-ECOUS
Towards a Tool-based Development Methodology for Pervasive Computing Applications
Despite much progress, developing a pervasive computing application remains a
challenge because of a lack of conceptual frameworks and supporting tools. This
challenge involves coping with heterogeneous devices, overcoming the
intricacies of distributed systems technologies, working out an architecture
for the application, encoding it in a program, writing specific code to test
the application, and finally deploying it. This paper presents a design
language and a tool suite covering the development life-cycle of a pervasive
computing application. The design language allows to define a taxonomy of
area-specific building-blocks, abstracting over their heterogeneity. This
language also includes a layer to define the architecture of an application,
following an architectural pattern commonly used in the pervasive computing
domain. Our underlying methodology assigns roles to the stakeholders, providing
separation of concerns. Our tool suite includes a compiler that takes design
artifacts written in our language as input and generates a programming
framework that supports the subsequent development stages, namely
implementation, testing, and deployment. Our methodology has been applied on a
wide spectrum of areas. Based on these experiments, we assess our approach
through three criteria: expressiveness, usability, and productivity
A Visual Programming Paradigm for Abstract Deep Learning Model Development
Deep learning is one of the fastest growing technologies in computer science
with a plethora of applications. But this unprecedented growth has so far been
limited to the consumption of deep learning experts. The primary challenge
being a steep learning curve for learning the programming libraries and the
lack of intuitive systems enabling non-experts to consume deep learning.
Towards this goal, we study the effectiveness of a no-code paradigm for
designing deep learning models. Particularly, a visual drag-and-drop interface
is found more efficient when compared with the traditional programming and
alternative visual programming paradigms. We conduct user studies of different
expertise levels to measure the entry level barrier and the developer load
across different programming paradigms. We obtain a System Usability Scale
(SUS) of 90 and a NASA Task Load index (TLX) score of 21 for the proposed
visual programming compared to 68 and 52, respectively, for the traditional
programming methods
Changing users' security behaviour towards security questions: A game based learning approach
Fallback authentication is used to retrieve forgotten passwords. Security
questions are one of the main techniques used to conduct fallback
authentication. In this paper, we propose a serious game design that uses
system-generated security questions with the aim of improving the usability of
fallback authentication. For this purpose, we adopted the popular picture-based
"4 Pics 1 word" mobile game. This game was selected because of its use of
pictures and cues, which previous psychology research found to be crucial to
aid memorability. This game asks users to pick the word that relates to the
given pictures. We then customized this game by adding features which help
maximize the following memory retrieval skills: (a) verbal cues - by providing
hints with verbal descriptions, (b) spatial cues - by maintaining the same
order of pictures, (c) graphical cues - by showing 4 images for each challenge,
(d) interactivity/engaging nature of the game.Comment: 6, Military Communications and Information Systems Conference
(MilCIS), 2017. arXiv admin note: substantial text overlap with
arXiv:1707.0807
Conceptualizing human resilience in the face of the global epidemiology of cyber attacks
Computer security is a complex global phenomenon where different populations interact, and the infection of one person creates risk for another. Given the dynamics and scope of cyber campaigns, studies of local resilience without reference to global populations are inadequate. In this paper we describe a set of minimal requirements for implementing a global epidemiological infrastructure to understand and respond to large-scale computer security outbreaks. We enumerate the relevant dimensions, the applicable measurement tools, and define a systematic approach to evaluate cyber security resilience. From the experience in conceptualizing and designing a cross-national coordinated phishing resilience evaluation we describe the cultural, logistic, and regulatory challenges to this proposed public health approach to global computer assault resilience. We conclude that mechanisms for systematic evaluations of global attacks and the resilience against those attacks exist. Coordinated global science is needed to address organised global ecrime
Recommended from our members
Facilitating insight into a simulation model using visualization and dynamic model previews
This paper shows how model simplification, by replacing iterative steps with unitary predictive equations, can enable dynamic interaction with a complex simulation process. Model previews extend the techniques of dynamic querying and query previews into the context of ad hoc simulation model exploration. A case study is presented within the domain of counter-current chromatography. The relatively novel method of insight evaluation was applied, given the exploratory nature of the task. The evaluation data show that the trade-off in accuracy is far outweighed by benefits of dynamic interaction. The number of insights gained using the enhanced interactive version of the computer model was more than six times higher than the number of insights gained using the basic version of the model. There was also a trend for dynamic interaction to facilitate insights of greater domain importance
- âŠ